emory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440), 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:41 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(0xffffffffffffffff, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r4 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:44 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:44 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:45 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:45 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:45 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 936.620883][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 936.627443][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 11:48:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:46 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(0xffffffffffffffff, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:48 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:52 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:53 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(0xffffffffffffffff, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:55 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:56 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 948.500586][ T5282] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 948.843465][ T5282] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 949.019450][ T5282] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 949.187301][ T5282] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:48:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 11:48:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:48:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:48:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:48:59 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) [ 951.082286][ T5282] hsr_slave_0: left promiscuous mode [ 951.109065][ T5282] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 951.116572][ T5282] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 951.142681][ T5282] bridge_slave_1: left allmulticast mode [ 951.148455][ T5282] bridge_slave_1: left promiscuous mode [ 951.155997][ T5282] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.168815][ T5282] bridge_slave_0: left allmulticast mode [ 951.187958][ T5282] bridge_slave_0: left promiscuous mode [ 951.207169][ T5282] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.245317][ T5282] veth1_vlan: left promiscuous mode [ 951.258763][ T5282] veth0_vlan: left promiscuous mode [ 952.671275][ T5282] team0 (unregistering): Port device team_slave_1 removed [ 952.692458][ T5282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 952.813883][ T5282] bond0 (unregistering): Released all slaves [ 953.059131][ T5050] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 953.069964][ T5050] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 953.078227][ T5050] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 953.090048][ T5050] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 953.097684][ T5050] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 953.105322][ T5050] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 953.507206][T25282] chnl_net:caif_netlink_parms(): no params data found [ 953.710960][T25282] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.718275][T25282] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.735503][T25282] bridge_slave_0: entered allmulticast mode [ 953.768397][T25282] bridge_slave_0: entered promiscuous mode [ 953.811584][T25282] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.829003][T25282] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.836288][T25282] bridge_slave_1: entered allmulticast mode [ 953.853376][T25282] bridge_slave_1: entered promiscuous mode [ 953.902868][T25282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 953.922148][T25282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 953.975669][T25282] team0: Port device team_slave_0 added [ 954.004125][T25282] team0: Port device team_slave_1 added [ 954.059902][T25282] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 954.066895][T25282] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 954.127779][T25282] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 954.151015][T25282] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 954.158082][T25282] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 954.204811][T25282] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 954.289259][T25282] hsr_slave_0: entered promiscuous mode [ 954.295976][T25282] hsr_slave_1: entered promiscuous mode [ 954.312476][T25282] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 954.327835][T25282] Cannot create hsr debugfs directory [ 955.179200][ T5050] Bluetooth: hci2: command 0x0409 tx timeout [ 955.321016][T25282] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 955.331807][T25282] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 955.342474][T25282] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 955.355438][T25282] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 955.507861][T25282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 955.525360][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 955.533637][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 955.545788][T25282] 8021q: adding VLAN 0 to HW filter on device team0 [ 955.557866][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 955.567928][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.576939][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.584124][ T5101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.609236][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 955.617948][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 955.627967][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.637685][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.644881][ T5101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.656296][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 955.665855][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 955.675208][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 955.694320][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 955.734433][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 955.757586][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 955.770266][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 955.787853][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 955.796733][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 955.805981][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 955.815154][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 955.829559][T25282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 956.080558][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 956.088091][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 956.104077][T25282] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 956.137894][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 956.148377][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 956.174319][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 956.184053][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 956.196127][T25282] veth0_vlan: entered promiscuous mode [ 956.210725][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 956.219449][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 956.232346][T25282] veth1_vlan: entered promiscuous mode [ 956.260294][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 956.269459][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 956.277828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 956.287971][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 956.301869][T25282] veth0_macvtap: entered promiscuous mode [ 956.320389][T25282] veth1_macvtap: entered promiscuous mode [ 956.348170][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.370182][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.386475][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.407566][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.419472][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.440640][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.458887][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 956.478264][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.490648][T25282] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 956.499695][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 956.508037][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 956.520217][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 956.529512][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 956.540653][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.558121][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.568677][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.579797][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.590005][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.600753][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.612537][T25282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 956.623898][T25282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 956.635793][T25282] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 956.646855][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 956.656819][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 956.677923][T25282] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.695975][T25282] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.705916][T25282] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.715798][T25282] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.849556][ T5282] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 956.857759][ T5282] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 956.887539][ T5131] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 956.935324][ T5282] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 956.948339][ T5282] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 956.983734][ T5131] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 957.268918][ T5050] Bluetooth: hci2: command 0x041b tx timeout 11:49:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, 0x0, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:06 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:07 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 959.338829][ T5050] Bluetooth: hci2: command 0x040f tx timeout 11:49:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x7f) 11:49:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:09 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:09 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) [ 961.418808][ T5050] Bluetooth: hci2: command 0x0419 tx timeout 11:49:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:10 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:10 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x78) 11:49:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:11 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x65) 11:49:12 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:12 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0x0, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x71) 11:49:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:14 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:14 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:15 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 11:49:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:16 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:17 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x67) 11:49:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}]}, 0x3f) 11:49:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:22 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r6, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) 11:49:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866"}, 0x5c) [ 974.541628][ T5050] Bluetooth: hci4: command 0x0406 tx timeout 11:49:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:24 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c"}, 0x6a) 11:49:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:26 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:27 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525cac26"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x0, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbca"}, 0x75) 11:49:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e1"}, 0x71) 11:49:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:31 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fb"}, 0x74) 11:49:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fb"}, 0x74) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a"}, 0x72) 11:49:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:39 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:40 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:40 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) socket(0x10, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21"}, 0x73) 11:49:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) [ 992.345285][ T10] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 992.568482][ T10] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.773637][ T10] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 992.928271][ T10] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:49:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:43 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 994.808612][ T10] hsr_slave_1: left promiscuous mode [ 994.814701][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 994.829345][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 994.851368][ T10] bridge_slave_1: left allmulticast mode [ 994.857206][ T10] bridge_slave_1: left promiscuous mode [ 994.874664][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.891863][ T10] bridge_slave_0: left allmulticast mode [ 994.897563][ T10] bridge_slave_0: left promiscuous mode [ 994.904633][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.943915][ T10] veth1_vlan: left promiscuous mode [ 994.961314][ T10] veth0_vlan: left promiscuous mode [ 995.883219][ T5050] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 995.895935][ T5050] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 995.906120][ T5050] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 995.914741][ T5050] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 995.923001][ T5050] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 995.931676][ T5050] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 996.588114][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 996.657645][ T10] bond0 (unregistering): Released all slaves [ 996.946171][T26477] chnl_net:caif_netlink_parms(): no params data found [ 997.071138][T26477] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.078341][T26477] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.086012][T26477] bridge_slave_0: entered allmulticast mode [ 997.093434][T26477] bridge_slave_0: entered promiscuous mode [ 997.103542][T26477] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.112845][T26477] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.120463][T26477] bridge_slave_1: entered allmulticast mode [ 997.127575][T26477] bridge_slave_1: entered promiscuous mode [ 997.182535][T26477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 997.211942][T26477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 997.267693][T26477] team0: Port device team_slave_0 added [ 997.291510][T26477] team0: Port device team_slave_1 added [ 997.350290][T26477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 997.357298][T26477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 997.399171][T26477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 997.412927][T26477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 997.420813][T26477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 997.478681][T26477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 997.564866][T26477] hsr_slave_0: entered promiscuous mode [ 997.580181][T26477] hsr_slave_1: entered promiscuous mode [ 997.980526][ T5050] Bluetooth: hci0: command 0x0409 tx timeout [ 998.065075][ T1217] ieee802154 phy0 wpan0: encryption failed: -22 [ 998.071457][ T1217] ieee802154 phy1 wpan1: encryption failed: -22 [ 998.475562][T26477] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 998.503601][T26477] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 998.524331][T26477] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 998.545473][T26477] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 998.735120][T26477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.758476][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 998.776267][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.794079][T26477] 8021q: adding VLAN 0 to HW filter on device team0 [ 998.816314][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 998.835583][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 998.845023][ T1455] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.852206][ T1455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.873139][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 998.882035][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 998.891341][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 998.900811][ T1455] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.907926][ T1455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.916315][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 998.944082][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.956807][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.976213][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.988271][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 999.006344][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.021894][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 999.040394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.056176][T26477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 999.083248][T26477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.107807][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.117369][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 999.126811][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.405901][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 999.422375][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 999.444292][T26477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 999.468129][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 999.477707][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 999.501554][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 999.511836][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 999.523357][T26477] veth0_vlan: entered promiscuous mode [ 999.542321][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 999.550530][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 999.564894][T26477] veth1_vlan: entered promiscuous mode [ 999.591578][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 999.600017][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 999.608364][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 999.618288][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 999.633280][T26477] veth0_macvtap: entered promiscuous mode [ 999.646881][T26477] veth1_macvtap: entered promiscuous mode [ 999.676956][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.696480][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.707145][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.720371][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.730528][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.748725][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.761617][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 999.772389][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.784255][T26477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 999.793467][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 999.807558][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 999.818662][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 999.830350][ T1455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 999.851747][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.862933][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.874724][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.885585][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.895777][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.906597][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.916827][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.936793][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.947299][T26477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 999.958320][T26477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 999.981652][T26477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 999.990925][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1000.000707][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1000.014090][T26477] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.026138][T26477] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.035296][T26477] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.045132][T26477] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1000.059388][ T5050] Bluetooth: hci0: command 0x041b tx timeout [ 1000.173309][T26466] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1000.202386][T26466] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1000.210802][ T5282] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1000.230240][ T4418] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1000.234329][ T5282] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1000.256305][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:49:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) 11:49:50 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) [ 1002.138870][ T5050] Bluetooth: hci0: command 0x040f tx timeout 11:49:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r8 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r8, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) 11:49:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f507e525c"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44b"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='net_dev_xmit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000440)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, 0x0}, 0x2004c050) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) sendfile(r2, r1, 0x0, 0x8000000000004) sendfile(r2, r2, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={0x0, 0xffff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r7, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'rcu_utilization\x00'}, {0x20, '\\]W}&\\'}, {0x20, ')%%_\\%%'}, {0x20, 'cpuacct.usage_percpu_user\x00'}, {}], 0xa, "7a536f6d47e2e814e7a71e9d3899d511749622b599b366d00a654c9866afe432cf37a8622fb2095c279e2c47e26ed4c163e12a21fbcab9ecd6"}, 0x80) 11:49:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2004c050) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) sendfile(r1, r1, &(0x7f0000000180), 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x17800}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000004e80)=ANY=[@ANYBLOB="2321202e2f66696c653070afa119f9228d7efa054de248ed2078accaea616c6c6572000ab286553b308f868515daaaeb3a9727a931db4bcbe970837bb50ea395d17afcaab44bdb16ad5f50"], 0x42) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3c}}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc}}, 0x20}}, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x35, 0x32ab) [ 1002.823804][T11683] ==================================================================