emory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440), 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:44 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:45 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:45 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:45 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 936.620883][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 936.627443][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 11:48:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:46 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:48 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:53 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:55 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:56 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 948.500586][ T5282] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 948.843465][ T5282] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 949.019450][ T5282] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 949.187301][ T5282] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:59 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) [ 951.082286][ T5282] hsr_slave_0: left promiscuous mode [ 951.109065][ T5282] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 951.116572][ T5282] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 951.142681][ T5282] bridge_slave_1: left allmulticast mode [ 951.148455][ T5282] bridge_slave_1: left promiscuous mode [ 951.155997][ T5282] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.168815][ T5282] bridge_slave_0: left allmulticast mode [ 951.187958][ T5282] bridge_slave_0: left promiscuous mode [ 951.207169][ T5282] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.245317][ T5282] veth1_vlan: left promiscuous mode [ 951.258763][ T5282] veth0_vlan: left promiscuous mode [ 952.671275][ T5282] team0 (unregistering): Port device team_slave_1 removed [ 952.692458][ T5282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 952.813883][ T5282] bond0 (unregistering): Released all slaves [ 953.059131][ T5050] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 953.069964][ T5050] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 953.078227][ T5050] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 953.090048][ T5050] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 953.097684][ T5050] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 953.105322][ T5050] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 953.507206][T25282] chnl_net:caif_netlink_parms(): no params data found [ 953.710960][T25282] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.718275][T25282] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.735503][T25282] bridge_slave_0: entered allmulticast mode [ 953.768397][T25282] bridge_slave_0: entered promiscuous mode [ 953.811584][T25282] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.829003][T25282] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.836288][T25282] bridge_slave_1: entered allmulticast mode [ 953.853376][T25282] bridge_slave_1: entered promiscuous mode [ 953.902868][T25282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 953.922148][T25282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 953.975669][T25282] team0: Port device team_slave_0 added [ 954.004125][T25282] team0: Port device team_slave_1 added [ 954.059902][T25282] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 954.066895][T25282] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 954.127779][T25282] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 954.151015][T25282] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 954.158082][T25282] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 954.204811][T25282] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 954.289259][T25282] hsr_slave_0: entered promiscuous mode [ 954.295976][T25282] hsr_slave_1: entered promiscuous mode [ 954.312476][T25282] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 954.327835][T25282] Cannot create hsr debugfs directory [ 955.179200][ T5050] Bluetooth: hci2: command 0x0409 tx timeout [ 955.321016][T25282] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 955.331807][T25282] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 955.342474][T25282] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 955.355438][T25282] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 955.507861][T25282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 955.525360][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 955.533637][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 955.545788][T25282] 8021q: adding VLAN 0 to HW filter on device team0 [ 955.557866][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 955.567928][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.576939][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.584124][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.609236][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 955.617948][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 955.627967][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.637685][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.644881][ T5101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.656296][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 955.665855][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 955.675208][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 955.694320][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 955.734433][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 955.757586][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 955.770266][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 955.787853][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 955.796733][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 955.805981][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 955.815154][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 955.829559][T25282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 956.080558][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 956.088091][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 956.104077][T25282] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 956.137894][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 956.148377][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 956.174319][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 956.184053][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 956.196127][T25282] veth0_vlan: entered promiscuous mode [ 956.210725][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 956.219449][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 956.232346][T25282] veth1_vlan: entered promiscuous mode [ 956.260294][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 956.269459][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 956.277828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 956.287971][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 956.301869][T25282] veth0_macvtap: entered promiscuous mode [ 956.320389][T25282] veth1_macvtap: entered promiscuous mode [ 956.348170][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.370182][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.386475][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.407566][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.419472][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.440640][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.458887][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.478264][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.490648][T25282] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 956.499695][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 956.508037][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 956.520217][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 956.529512][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 956.540653][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.558121][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.568677][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.579797][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.590005][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.600753][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.612537][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.623898][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.635793][T25282] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 956.646855][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 956.656819][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 956.677923][T25282] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.695975][T25282] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.705916][T25282] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.715798][T25282] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.849556][ T5282] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 956.857759][ T5282] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 956.887539][ T5131] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 956.935324][ T5282] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 956.948339][ T5282] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 956.983734][ T5131] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 957.268918][ T5050] Bluetooth: hci2: command 0x041b tx timeout 11:49:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:06 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:07 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 959.338829][ T5050] Bluetooth: hci2: command 0x040f tx timeout 11:49:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:09 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:09 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) [ 961.418808][ T5050] Bluetooth: hci2: command 0x0419 tx timeout 11:49:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:10 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:12 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:12 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:14 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:14 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:15 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:16 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:17 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:22 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) [ 974.541628][ T5050] Bluetooth: hci4: command 0x0406 tx timeout 11:49:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:24 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:26 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:27 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbca"}, 0x75) 11:49:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:31 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fb"}, 0x74) 11:49:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fb"}, 0x74) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:40 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) [ 992.345285][ T10] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 992.568482][ T10] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.773637][ T10] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 992.928271][ T10] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 994.808612][ T10] hsr_slave_1: left promiscuous mode [ 994.814701][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 994.829345][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 994.851368][ T10] bridge_slave_1: left allmulticast mode [ 994.857206][ T10] bridge_slave_1: left promiscuous mode [ 994.874664][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.891863][ T10] bridge_slave_0: left allmulticast mode [ 994.897563][ T10] bridge_slave_0: left promiscuous mode [ 994.904633][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.943915][ T10] veth1_vlan: left promiscuous mode [ 994.961314][ T10] veth0_vlan: left promiscuous mode [ 995.883219][ T5050] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 995.895935][ T5050] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 995.906120][ T5050] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 995.914741][ T5050] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 995.923001][ T5050] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 995.931676][ T5050] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 996.588114][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 996.657645][ T10] bond0 (unregistering): Released all slaves [ 996.946171][T26477] chnl_net:caif_netlink_parms(): no params data found [ 997.071138][T26477] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.078341][T26477] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.086012][T26477] bridge_slave_0: entered allmulticast mode [ 997.093434][T26477] bridge_slave_0: entered promiscuous mode [ 997.103542][T26477] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.112845][T26477] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.120463][T26477] bridge_slave_1: entered allmulticast mode [ 997.127575][T26477] bridge_slave_1: entered promiscuous mode [ 997.182535][T26477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 997.211942][T26477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 997.267693][T26477] team0: Port device team_slave_0 added [ 997.291510][T26477] team0: Port device team_slave_1 added [ 997.350290][T26477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 997.357298][T26477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 997.399171][T26477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 997.412927][T26477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 997.420813][T26477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 997.478681][T26477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 997.564866][T26477] hsr_slave_0: entered promiscuous mode [ 997.580181][T26477] hsr_slave_1: entered promiscuous mode [ 997.980526][ T5050] Bluetooth: hci0: command 0x0409 tx timeout [ 998.065075][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 998.071457][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 [ 998.475562][T26477] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 998.503601][T26477] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 998.524331][T26477] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 998.545473][T26477] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 998.735120][T26477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.758476][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 998.776267][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.794079][T26477] 8021q: adding VLAN 0 to HW filter on device team0 [ 998.816314][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 998.835583][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 998.845023][ T1455] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.852206][ T1455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.873139][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 998.882035][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 998.891341][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 998.900811][ T1455] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.907926][ T1455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.916315][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 998.944082][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.956807][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.976213][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.988271][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 999.006344][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.021894][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 999.040394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.056176][T26477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 999.083248][T26477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.107807][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.117369][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 999.126811][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.405901][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 999.422375][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 999.444292][T26477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 999.468129][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 999.477707][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 999.501554][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 999.511836][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 999.523357][T26477] veth0_vlan: entered promiscuous mode [ 999.542321][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 999.550530][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 999.564894][T26477] veth1_vlan: entered promiscuous mode [ 999.591578][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 999.600017][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 999.608364][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 999.618288][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 999.633280][T26477] veth0_macvtap: entered promiscuous mode [ 999.646881][T26477] veth1_macvtap: entered promiscuous mode [ 999.676956][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.696480][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.707145][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.720371][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.730528][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.748725][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.761617][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.772389][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.784255][T26477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 999.793467][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 999.807558][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 999.818662][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 999.830350][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 999.851747][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.862933][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.874724][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.885585][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.895777][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.906597][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.916827][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.936793][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.947299][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.958320][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.981652][T26477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 999.990925][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1000.000707][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1000.014090][T26477] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.026138][T26477] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.035296][T26477] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.045132][T26477] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.059388][ T5050] Bluetooth: hci0: command 0x041b tx timeout [ 1000.173309][T26466] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1000.202386][T26466] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1000.210802][ T5282] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1000.230240][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1000.234329][ T5282] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1000.256305][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 1002.138870][ T5050] Bluetooth: hci0: command 0x040f tx timeout 11:49:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 1002.823804][T11683] ================================================================== [ 1002.831925][T11683] BUG: KASAN: slab-use-after-free in hci_conn_hash_flush+0x244/0x270 [ 1002.840158][T11683] Read of size 8 at addr ffff888021688000 by task syz-executor.0/11683 [ 1002.848403][T11683] [ 1002.850735][T11683] CPU: 0 PID: 11683 Comm: syz-executor.0 Not tainted 6.4.0-rc2-syzkaller-00562-g657d42cf5df6 #0 [ 1002.861178][T11683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/16/2023 [ 1002.871271][T11683] Call Trace: [ 1002.874591][T11683] [ 1002.877547][T11683] dump_stack_lvl+0xd9/0x150 [ 1002.882219][T11683] print_address_description.constprop.0+0x2c/0x3c0 [ 1002.888924][T11683] ? hci_conn_hash_flush+0x244/0x270 [ 1002.894271][T11683] kasan_report+0x11c/0x130 [ 1002.898836][T11683] ? hci_conn_hash_flush+0x244/0x270 [ 1002.904186][T11683] hci_conn_hash_flush+0x244/0x270 [ 1002.909355][T11683] hci_dev_close_sync+0x5fb/0x1200 [ 1002.914568][T11683] ? hci_reset_sync+0x50/0x50 [ 1002.919284][T11683] ? __kmem_cache_free+0xaf/0x2d0 [ 1002.924371][T11683] hci_dev_do_close+0x31/0x70 [ 1002.929177][T11683] hci_unregister_dev+0x1ce/0x580 [ 1002.934245][T11683] vhci_release+0x80/0xf0 [ 1002.938714][T11683] __fput+0x27c/0xa90 [ 1002.942760][T11683] ? vhci_close_dev+0x50/0x50 [ 1002.947488][T11683] task_work_run+0x16f/0x270 [ 1002.952145][T11683] ? task_work_cancel+0x30/0x30 [ 1002.957036][T11683] do_exit+0xad3/0x2960 [ 1002.961212][T11683] ? lock_downgrade+0x690/0x690 [ 1002.966104][T11683] ? do_raw_spin_lock+0x124/0x2b0 [ 1002.971158][T11683] ? mm_update_next_owner+0x7b0/0x7b0 [ 1002.976549][T11683] ? spin_bug+0x1c0/0x1c0 [ 1002.980919][T11683] ? _raw_spin_unlock_irq+0x23/0x50 [ 1002.986232][T11683] do_group_exit+0xd4/0x2a0 [ 1002.990761][T11683] __x64_sys_exit_group+0x3e/0x50 [ 1002.995819][T11683] do_syscall_64+0x39/0xb0 [ 1003.000314][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.006300][T11683] RIP: 0033:0x7f229608c169 [ 1003.010729][T11683] Code: Unable to access opcode bytes at 0x7f229608c13f. [ 1003.017750][T11683] RSP: 002b:00007ffe15c01fe8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1003.026173][T11683] RAX: ffffffffffffffda RBX: 00007ffe15c02190 RCX: 00007f229608c169 [ 1003.034152][T11683] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000043 [ 1003.042133][T11683] RBP: 0000000000000000 R08: 0000000000000025 R09: 00007ffe15c02190 [ 1003.050119][T11683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22960e7c72 [ 1003.058099][T11683] R13: 000000000000001c R14: 000000000000001c R15: 00007ffe15c021d0 [ 1003.066087][T11683] [ 1003.069200][T11683] [ 1003.071528][T11683] Allocated by task 12390: [ 1003.075940][T11683] kasan_save_stack+0x22/0x40 [ 1003.080659][T11683] kasan_set_track+0x25/0x30 [ 1003.085277][T11683] __kasan_kmalloc+0xa2/0xb0 [ 1003.089896][T11683] hci_conn_add+0xb8/0x16b0 [ 1003.094424][T11683] hci_connect_sco+0x3c7/0x1050 [ 1003.099298][T11683] sco_sock_connect+0x2d7/0xae0 [ 1003.104216][T11683] __sys_connect_file+0x153/0x1a0 [ 1003.109310][T11683] __sys_connect+0x165/0x1a0 [ 1003.113923][T11683] __x64_sys_connect+0x73/0xb0 [ 1003.118707][T11683] do_syscall_64+0x39/0xb0 [ 1003.123165][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.129181][T11683] [ 1003.131515][T11683] Freed by task 11683: [ 1003.135587][T11683] kasan_save_stack+0x22/0x40 [ 1003.140292][T11683] kasan_set_track+0x25/0x30 [ 1003.144914][T11683] kasan_save_free_info+0x2e/0x40 [ 1003.149952][T11683] ____kasan_slab_free+0x160/0x1c0 [ 1003.155095][T11683] slab_free_freelist_hook+0x8b/0x1c0 [ 1003.160493][T11683] __kmem_cache_free+0xaf/0x2d0 [ 1003.165369][T11683] device_release+0xa3/0x240 [ 1003.170007][T11683] kobject_put+0x1c2/0x4d0 [ 1003.174440][T11683] put_device+0x1f/0x30 [ 1003.178615][T11683] hci_conn_del+0x1e5/0x950 [ 1003.183143][T11683] hci_conn_unlink+0x2ce/0x460 [ 1003.187932][T11683] hci_conn_unlink+0x362/0x460 [ 1003.192723][T11683] hci_conn_hash_flush+0x19b/0x270 [ 1003.197859][T11683] hci_dev_close_sync+0x5fb/0x1200 [ 1003.202994][T11683] hci_dev_do_close+0x31/0x70 [ 1003.207702][T11683] hci_unregister_dev+0x1ce/0x580 [ 1003.212740][T11683] vhci_release+0x80/0xf0 [ 1003.217171][T11683] __fput+0x27c/0xa90 [ 1003.221169][T11683] task_work_run+0x16f/0x270 [ 1003.225778][T11683] do_exit+0xad3/0x2960 [ 1003.229977][T11683] do_group_exit+0xd4/0x2a0 [ 1003.234501][T11683] __x64_sys_exit_group+0x3e/0x50 [ 1003.239542][T11683] do_syscall_64+0x39/0xb0 [ 1003.243991][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.249911][T11683] [ 1003.252236][T11683] Last potentially related work creation: [ 1003.257950][T11683] kasan_save_stack+0x22/0x40 [ 1003.262651][T11683] __kasan_record_aux_stack+0xbc/0xd0 [ 1003.268039][T11683] insert_work+0x48/0x360 [ 1003.272404][T11683] __queue_work+0x625/0x1120 [ 1003.277014][T11683] __queue_delayed_work+0x1c8/0x270 [ 1003.282240][T11683] queue_delayed_work_on+0x109/0x120 [ 1003.287553][T11683] sco_chan_del+0x1f8/0x4f0 [ 1003.292077][T11683] __sco_sock_close+0x178/0x740 [ 1003.297122][T11683] sco_sock_release+0x81/0x360 [ 1003.301909][T11683] __sock_release+0xcd/0x290 [ 1003.306513][T11683] sock_close+0x1c/0x20 [ 1003.310682][T11683] __fput+0x27c/0xa90 [ 1003.314678][T11683] task_work_run+0x16f/0x270 [ 1003.319283][T11683] get_signal+0x1c7/0x25b0 [ 1003.323722][T11683] arch_do_signal_or_restart+0x79/0x5c0 [ 1003.329310][T11683] exit_to_user_mode_prepare+0x11f/0x240 [ 1003.334979][T11683] syscall_exit_to_user_mode+0x1d/0x50 [ 1003.340463][T11683] do_syscall_64+0x46/0xb0 [ 1003.344905][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.350827][T11683] [ 1003.353156][T11683] The buggy address belongs to the object at ffff888021688000 [ 1003.353156][T11683] which belongs to the cache kmalloc-4k of size 4096 [ 1003.367229][T11683] The buggy address is located 0 bytes inside of [ 1003.367229][T11683] freed 4096-byte region [ffff888021688000, ffff888021689000) [ 1003.380961][T11683] [ 1003.383288][T11683] The buggy address belongs to the physical page: [ 1003.389711][T11683] page:ffffea000085a200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21688 [ 1003.399900][T11683] head:ffffea000085a200 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1003.408875][T11683] anon flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 1003.417309][T11683] page_type: 0xffffffff() [ 1003.421658][T11683] raw: 00fff00000010200 ffff888012442140 0000000000000000 dead000000000001 [ 1003.430254][T11683] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 1003.438845][T11683] page dumped because: kasan: bad access detected [ 1003.445261][T11683] page_owner tracks the page as allocated [ 1003.450976][T11683] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 5880, tgid 5880 (udevd), ts 239332241256, free_ts 239328238808 [ 1003.472529][T11683] post_alloc_hook+0x2db/0x350 [ 1003.477347][T11683] get_page_from_freelist+0xf41/0x2c00 [ 1003.482856][T11683] __alloc_pages+0x1cb/0x4a0 [ 1003.487476][T11683] alloc_pages+0x1aa/0x270 [ 1003.491915][T11683] allocate_slab+0x25f/0x390 [ 1003.496524][T11683] ___slab_alloc+0xa91/0x1400 [ 1003.501222][T11683] __slab_alloc.constprop.0+0x56/0xa0 [ 1003.506630][T11683] __kmem_cache_alloc_node+0x136/0x320 [ 1003.512113][T11683] __kmalloc+0x4e/0x190 [ 1003.516281][T11683] tomoyo_realpath_from_path+0xc3/0x600 [ 1003.521868][T11683] tomoyo_path_perm+0x230/0x430 [ 1003.526726][T11683] security_inode_getattr+0xd3/0x140 [ 1003.532025][T11683] vfs_statx+0x16e/0x430 [ 1003.536313][T11683] vfs_fstatat+0x90/0xb0 [ 1003.540579][T11683] __do_sys_newfstatat+0x8a/0x110 [ 1003.545641][T11683] do_syscall_64+0x39/0xb0 [ 1003.550090][T11683] page last free stack trace: [ 1003.554771][T11683] free_unref_page_prepare+0x62e/0xcb0 [ 1003.560268][T11683] free_unref_page+0x33/0x370 [ 1003.564968][T11683] __unfreeze_partials+0x17c/0x1a0 [ 1003.570096][T11683] qlist_free_all+0x6a/0x170 [ 1003.574707][T11683] kasan_quarantine_reduce+0x195/0x220 [ 1003.580180][T11683] __kasan_slab_alloc+0x63/0x90 [ 1003.585051][T11683] kmem_cache_alloc+0x17c/0x3b0 [ 1003.589922][T11683] getname_flags.part.0+0x50/0x4f0 [ 1003.595043][T11683] getname+0x92/0xd0 [ 1003.598956][T11683] do_sys_openat2+0xf5/0x4c0 [ 1003.603571][T11683] __x64_sys_openat+0x143/0x1f0 [ 1003.608442][T11683] do_syscall_64+0x39/0xb0 [ 1003.612886][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.618803][T11683] [ 1003.621129][T11683] Memory state around the buggy address: [ 1003.626756][T11683] ffff888021687f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1003.634828][T11683] ffff888021687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1003.642895][T11683] >ffff888021688000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1003.650960][T11683] ^ [ 1003.655029][T11683] ffff888021688080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1003.663097][T11683] ffff888021688100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1003.671157][T11683] ================================================================== [ 1003.691814][T11683] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 1003.699049][T11683] CPU: 1 PID: 11683 Comm: syz-executor.0 Not tainted 6.4.0-rc2-syzkaller-00562-g657d42cf5df6 #0 [ 1003.709498][T11683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/16/2023 [ 1003.719585][T11683] Call Trace: [ 1003.722890][T11683] [ 1003.725842][T11683] dump_stack_lvl+0xd9/0x150 [ 1003.730477][T11683] panic+0x686/0x730 [ 1003.734438][T11683] ? panic_smp_self_stop+0xa0/0xa0 [ 1003.739602][T11683] ? preempt_schedule_thunk+0x1a/0x20 [ 1003.745053][T11683] ? preempt_schedule_common+0x45/0xb0 [ 1003.750558][T11683] check_panic_on_warn+0xb1/0xc0 [ 1003.755541][T11683] end_report+0xe9/0x120 [ 1003.759826][T11683] ? hci_conn_hash_flush+0x244/0x270 [ 1003.765173][T11683] kasan_report+0xf9/0x130 [ 1003.769656][T11683] ? hci_conn_hash_flush+0x244/0x270 [ 1003.774994][T11683] hci_conn_hash_flush+0x244/0x270 [ 1003.780149][T11683] hci_dev_close_sync+0x5fb/0x1200 [ 1003.785294][T11683] ? hci_reset_sync+0x50/0x50 [ 1003.790005][T11683] ? __kmem_cache_free+0xaf/0x2d0 [ 1003.795079][T11683] hci_dev_do_close+0x31/0x70 [ 1003.799823][T11683] hci_unregister_dev+0x1ce/0x580 [ 1003.804902][T11683] vhci_release+0x80/0xf0 [ 1003.809277][T11683] __fput+0x27c/0xa90 [ 1003.813304][T11683] ? vhci_close_dev+0x50/0x50 [ 1003.818036][T11683] task_work_run+0x16f/0x270 [ 1003.822668][T11683] ? task_work_cancel+0x30/0x30 [ 1003.827561][T11683] do_exit+0xad3/0x2960 [ 1003.831765][T11683] ? lock_downgrade+0x690/0x690 [ 1003.836666][T11683] ? do_raw_spin_lock+0x124/0x2b0 [ 1003.841843][T11683] ? mm_update_next_owner+0x7b0/0x7b0 [ 1003.847249][T11683] ? spin_bug+0x1c0/0x1c0 [ 1003.851631][T11683] ? _raw_spin_unlock_irq+0x23/0x50 [ 1003.856963][T11683] do_group_exit+0xd4/0x2a0 [ 1003.861579][T11683] __x64_sys_exit_group+0x3e/0x50 [ 1003.866624][T11683] do_syscall_64+0x39/0xb0 [ 1003.871075][T11683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1003.877002][T11683] RIP: 0033:0x7f229608c169 [ 1003.881450][T11683] Code: Unable to access opcode bytes at 0x7f229608c13f. [ 1003.888562][T11683] RSP: 002b:00007ffe15c01fe8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1003.897014][T11683] RAX: ffffffffffffffda RBX: 00007ffe15c02190 RCX: 00007f229608c169 [ 1003.905087][T11683] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000043 [ 1003.913086][T11683] RBP: 0000000000000000 R08: 0000000000000025 R09: 00007ffe15c02190 [ 1003.921069][T11683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22960e7c72 [ 1003.929060][T11683] R13: 000000000000001c R14: 000000000000001c R15: 00007ffe15c021d0 [ 1003.937055][T11683] [ 1003.940305][T11683] Kernel Offset: disabled [ 1003.944639][T11683] Rebooting in 86400 seconds..