000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:31 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:31 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x0, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) [ 988.157260][T27226] netdevsim netdevsim4 netdevsim2: renamed from eth2 11:17:32 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x0) 11:17:32 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:33 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f", 0x3b, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}], 0x10, 0x4000804}, 0x4000000) 11:17:34 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a", 0x3c}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:34 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa0, 0x4000804}, 0x4000000) 11:17:35 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() r3 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01}}}], 0x88, 0x4000804}, 0x4000000) [ 992.884841][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.891169][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 11:17:36 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) [ 993.189388][T27176] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.213413][T27226] netdevsim netdevsim4 netdevsim3: renamed from eth3 11:17:36 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:37 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x0, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:37 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a", 0x3c}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:39 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() r3 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01}}}], 0x88, 0x4000804}, 0x4000000) 11:17:39 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xd00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:40 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x0, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:40 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) (async) gettid() (async) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") (async) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) (async) 11:17:41 executing program 2: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xe00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 997.844938][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 997.867822][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 997.894219][T23583] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.901409][T23583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.952476][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 997.972693][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 997.981220][T23583] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.988361][T23583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.062343][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 998.081008][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.120978][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.154476][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.267358][T27176] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 998.322979][T27176] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 998.350709][T27179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.513197][T27179] 8021q: adding VLAN 0 to HW filter on device team0 [ 998.569102][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 998.582693][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 998.591003][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 998.612906][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 998.621816][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 998.630563][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 998.642520][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 998.653570][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 998.663056][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 998.672960][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.724823][T27226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.762526][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 998.770564][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 998.784624][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 998.812527][T27511] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.819746][T27511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.842500][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 998.851307][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 998.872602][T27511] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.879710][T27511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.912471][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 998.923048][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.943043][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.960042][T27511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 999.044475][T27226] 8021q: adding VLAN 0 to HW filter on device team0 [ 999.051642][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 999.066218][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.082778][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 999.091674][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.125059][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 999.147145][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.172739][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 999.193859][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 999.213705][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 999.252592][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.291589][T27179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.334683][T27176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 999.344237][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 999.351802][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 999.361964][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 999.371480][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 999.382418][T27519] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.389563][T27519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.398230][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 999.407286][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 999.422774][T27519] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.429917][T27519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.438348][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 999.510098][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 999.524322][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 999.537283][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 999.551646][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 999.564182][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 999.579022][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.591623][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 999.602850][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 11:17:43 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x6, 0x10}, 0xc) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001500)={r3, 0x0, 0x0}, 0x10) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="18ec7bf6cb9de5d7a3bc35b7912a0dc8e074acb74a9c795c06156b420eaeb43a5cf1ab6fb7bcb13cfe0ee37d2703b481b845110817d404235483f164330eb208cbaf8b8a52151270aa4ffd1eb61821c59b96179aa35fe712c0e1030b20470ed584c8b7861be7b7cdee79c046b69f3eba4616bf292f9568fc6c988ded9b031b8d5cf33672f9707265cdc69880f01a84d9393c20b46d37fc51ebe1a27bf5113b149358d691b510b30200e9b3a8c4d5d4a5ef20f64b859ffc3a4a07ee5effdf82baf7cd13", @ANYRES32=r0, @ANYBLOB="00000022d3000000"], &(0x7f0000000040)='GPL\x00', 0x7, 0xd9, &(0x7f0000000080)=""/217, 0x41100, 0x4, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xf, 0x4, 0x40}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000380)=[r2, r0, r0, r0, r3, r4, r0, r0], &(0x7f0000000480)=[{0x1, 0x3, 0x5, 0xc}, {0x3, 0x1, 0x3, 0x6}, {0x4, 0x4, 0x3, 0xc}, {0x2, 0x2, 0xc}, {0x1, 0x1, 0x6, 0xb}, {0x2, 0x5, 0x1, 0x3}, {0x1, 0x2, 0x9, 0x2}, {0x4, 0x3, 0x6, 0x2}], 0x10, 0x1ff}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r5}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r5, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f00000005c0)='%pK \x00'}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000640)=r6, 0x4) [ 999.616442][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 999.628535][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.644584][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 999.660574][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.689540][T27226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.743058][T27176] device veth0_vlan entered promiscuous mode [ 999.795744][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.818365][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 999.864213][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 999.896432][T27176] device veth1_vlan entered promiscuous mode [ 1000.022879][T27176] device veth0_macvtap entered promiscuous mode [ 1000.043419][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1000.052274][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1000.060209][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1000.082955][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1000.113018][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1000.120612][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1000.141807][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1000.154602][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1000.184319][T27179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1000.214958][T27176] device veth1_macvtap entered promiscuous mode [ 1000.271727][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.302062][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.321963][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.342042][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.382028][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.412053][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.431992][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.461987][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.491913][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.512651][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.541985][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1000.552525][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.594638][T27176] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1000.625198][T27226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1000.633137][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1000.642360][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1000.649954][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1000.662300][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1000.682542][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1000.691439][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1000.732913][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1000.778126][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1000.812255][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.852078][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1000.889970][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.919920][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1000.949430][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1000.959363][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 11:17:44 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xf00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1001.003658][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1bb181, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r0, 0x4000, r0}, 0x18) [ 1001.053263][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1001.083150][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1001.093105][T27176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1001.132090][T27176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1001.183288][T27176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1001.202742][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1001.222876][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1001.231836][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1001.262780][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1001.272806][T23924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1001.280722][T23924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1001.324713][T27179] device veth0_vlan entered promiscuous mode [ 1001.336189][T27176] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.352041][T27176] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.360777][T27176] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.422152][T27176] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:17:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:45 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1bb181, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r0, 0x4000, r0}, 0x18) 11:17:45 executing program 2: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:45 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) (async) [ 1002.454481][T27179] device veth1_vlan entered promiscuous mode 11:17:46 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) 11:17:46 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1002.975547][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1002.992762][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1003.013601][T27179] device veth0_macvtap entered promiscuous mode [ 1003.042459][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1003.051239][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1003.079696][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1003.095680][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1003.120751][T27226] device veth0_vlan entered promiscuous mode [ 1003.129993][ T7300] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1003.152160][ T7300] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1003.170456][T27179] device veth1_macvtap entered promiscuous mode [ 1003.185001][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1003.204969][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1003.233339][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1003.252593][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1003.272711][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1003.312878][ T1436] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1003.318877][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.320941][ T1436] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1003.352012][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.371993][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.398481][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.420073][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.452303][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:46 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) [ 1003.482029][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.501906][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.522580][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.551665][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.591183][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.624000][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.641908][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1003.661916][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.693529][T27179] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1003.704683][T27226] device veth1_vlan entered promiscuous mode [ 1003.712587][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1003.725630][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:17:47 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) [ 1003.753900][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1003.775289][T23927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 11:17:47 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1003.834468][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1003.891942][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1003.901804][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1003.928532][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:47 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1300, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1003.952677][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1003.981793][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1004.006534][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 11:17:47 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1004.057822][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1004.068060][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1004.091920][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:47 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) [ 1004.104109][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1004.132812][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:47 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1004.202859][T27179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1004.241908][T27179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1004.253812][T27179] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1004.313367][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1004.324876][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1004.340814][T27179] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 11:17:47 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) [ 1004.367478][T27179] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1004.384036][T27179] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 11:17:47 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xf, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa5d, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x6, 0x8, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x10, 0x3}, 0x90) [ 1004.413174][T27179] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1004.534182][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1004.563769][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 11:17:47 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1500, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1004.584687][T27226] device veth0_macvtap entered promiscuous mode [ 1004.696232][T27226] device veth1_macvtap entered promiscuous mode 11:17:48 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xf, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa5d, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x6, 0x8, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x10, 0x3}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xf, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa5d, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x6, 0x8, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x10, 0x3}, 0x90) (async) [ 1004.755744][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1004.773672][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 11:17:48 executing program 2: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1600, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:48 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1004.811011][ T5508] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1004.829863][ T5508] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1004.841065][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1004.873170][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1004.895682][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1004.915816][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1004.931913][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1004.962364][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:48 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) [ 1004.989156][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.028789][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:48 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:48 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1700, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1005.061974][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.092033][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:48 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1005.132450][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.151913][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.161768][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 11:17:48 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) [ 1005.217652][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.259768][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.286322][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.321531][T27226] batman_adv: batadv0: Interface activated: batadv_slave_0 11:17:48 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:48 executing program 1: syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1005.368918][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1005.381260][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1005.423143][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 11:17:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:49 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1900, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:49 executing program 1: syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:49 executing program 3: syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:49 executing program 1: syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) [ 1006.158945][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.191912][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.201813][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.236045][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.262011][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.276189][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:49 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1a00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1006.299563][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.319682][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.351924][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.377270][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:17:49 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1006.403695][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.427924][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.455995][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.481910][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.491756][T27226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.524262][T27226] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.547971][T27226] batman_adv: batadv0: Interface activated: batadv_slave_1 11:17:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:50 executing program 1: syz_clone(0xc97dc8308d900743, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1006.749782][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1006.760207][ T7300] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.775046][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1006.801420][ T7300] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.856579][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1006.876385][T27226] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 11:17:50 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1b00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:50 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) [ 1006.900317][T27226] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1006.909621][T27226] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1006.931991][T27226] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:17:50 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80", 0xc8}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:50 executing program 0: syz_clone(0xc97dc8308d900743, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:17:50 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() r4 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80", 0xc8}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) 11:17:50 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1c00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:50 executing program 0: syz_clone(0xc97dc8308d900743, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)="24b78b") 11:17:50 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1d00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:50 executing program 1: syz_clone(0xc97dc8308d900743, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1007.573433][ T1436] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1007.581466][ T1436] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1007.649584][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1007.676811][T27672] chnl_net:caif_netlink_parms(): no params data found [ 1007.708804][ T1436] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1007.722281][ T1436] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 11:17:51 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x111140, 0x0) 11:17:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}], 0x10, 0x4000804}, 0x4000000) [ 1007.809184][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:17:51 executing program 4: syz_clone(0xc97dc8308d900743, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)="24b78b") 11:17:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}], 0x10, 0x4000804}, 0x4000000) [ 1008.002891][T27514] Bluetooth: hci2: command 0x0409 tx timeout 11:17:51 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1e00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:51 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111140, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:51 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001480)={&(0x7f0000000280)="2aa147400ce7dda5154f7ed23af1542f", &(0x7f00000002c0)=""/149, &(0x7f0000000380)="4ac58fde1712d4d948f20a2f49ca5cda8bef9708dc31486c5971b419f1e65d873da97fd243a5d0e3438d00a7455c6accd7a593b8055212f096dcf0a662f78bf94bdd480bcc4d9b0a1afb", &(0x7f0000000480)="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", 0x5, r0, 0x4}, 0x38) (async) 11:17:51 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x111140, 0x0) 11:17:51 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1f00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x4000000) 11:17:51 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000000)="0d606bd136f0ea56eb2813611086ddb642c03b5cc054bbc7564998ddb870b8ad56e5bb56cee4a007023df29206c1c7dab8a4f4a9b1515a6fb4afae92e5d0aea14c28416672df804ac3575f7bff0bcb", &(0x7f0000000480)=""/4096, &(0x7f0000000080)="7f9ea88585e8a2970b5bed7c9581cd4200518eab60b19d0bb7217294c87126fd2135c264f0aa30fa706f82e0ea824de147d14821486a1af6c2960dd9eed0289b0e2da78b41f6442a41ce3e0c0edae5c48c420be439b005896689a54b8be62f4eee81f7dc0ad052dc2f4497c25025d90d40d0ac5aded9691f2b89b5fbc4a55dc0e00341e823c4e1d89337270a10ae7c40dfafa35772db0a372ce02f3f4e745b643713738fb24ee42a88a7d3b68c85ebaf8f02909bf55d6e7bb767989e76a7db3ec132dd3dbec7cd500d7588c87d7647c15e04a728ff2c0831cff4f12d7ada3d74f0bcbe0687a4bf809d396e", &(0x7f0000000180)="e951d953caf1dd8ea770403e0431601d0881feacf3d98fde5feb367848c2e262e508e498ed5a321c7eaf175eaadfaa3ee253d489900a0a18736f0be01f3ddd8efa3b081bc56fcf9ce8e06fa8af0ddbfbdcd78e3f9ae6f180e7ab6ece7a285bc6649b", 0x80, r0}, 0x38) 11:17:51 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x111140, 0x0) 11:17:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x4000000) 11:17:51 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000000)="0d606bd136f0ea56eb2813611086ddb642c03b5cc054bbc7564998ddb870b8ad56e5bb56cee4a007023df29206c1c7dab8a4f4a9b1515a6fb4afae92e5d0aea14c28416672df804ac3575f7bff0bcb", &(0x7f0000000480)=""/4096, &(0x7f0000000080)="7f9ea88585e8a2970b5bed7c9581cd4200518eab60b19d0bb7217294c87126fd2135c264f0aa30fa706f82e0ea824de147d14821486a1af6c2960dd9eed0289b0e2da78b41f6442a41ce3e0c0edae5c48c420be439b005896689a54b8be62f4eee81f7dc0ad052dc2f4497c25025d90d40d0ac5aded9691f2b89b5fbc4a55dc0e00341e823c4e1d89337270a10ae7c40dfafa35772db0a372ce02f3f4e745b643713738fb24ee42a88a7d3b68c85ebaf8f02909bf55d6e7bb767989e76a7db3ec132dd3dbec7cd500d7588c87d7647c15e04a728ff2c0831cff4f12d7ada3d74f0bcbe0687a4bf809d396e", &(0x7f0000000180)="e951d953caf1dd8ea770403e0431601d0881feacf3d98fde5feb367848c2e262e508e498ed5a321c7eaf175eaadfaa3ee253d489900a0a18736f0be01f3ddd8efa3b081bc56fcf9ce8e06fa8af0ddbfbdcd78e3f9ae6f180e7ab6ece7a285bc6649b", 0x80, r0}, 0x38) 11:17:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 11:17:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x4000000) 11:17:52 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000600)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', r2, r1, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x31, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 11:17:52 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:52 executing program 1: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000480)='cpu.pressure\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)=@o_path={&(0x7f0000000340)='./file0\x00', r0, 0x4000, r1}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000000)=@llc={0x1a, 0x4, 0xff, 0x1f, 0x0, 0x2, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="b83416b2370ff25fedea39ba339226163ddc088ed86d0d7bddf8acb0ada1dc288ab4054ebd9fa3019c7a5b3126d455d8a56110089a92d547d7619a3134d655d38c9880602c0ea42dfef2589e3398593361e6eba20c9a65984e535c2795980df407d167fb64e4125c7e6a173c507795e92dcfb4b3168f4b649c3154f86c55981cedf0eee5c9edbb08fd3e2339c3abee37f30fd4ef68c5b58f9a010cc6", 0x9c}, {&(0x7f0000000140)="cdfd9c1e3437e598c33187404b9678d0751e6282b88f10f5d84f416ebc58d802f2456c80f277e7abbeea0eb1e33a7db74a90be61ba374c7df59c158ed269bb5942c0c8a964b59a23e4a1a04e00313c801b6b45eab8b109ad44e78722a3fb27c91fff52862ba6bd99a5b460c4d8f2dfedb993fc5e5881761b013ad3afc6fd3e7760c743666f187eb999610c", 0x8b}, {&(0x7f0000000200)="a57ee6f9dd9035935562f42675889c02d22e33b20f803c924f8e99ec34217b3575be79986d7014975418b5dc7b32384ed6f0", 0x32}, {&(0x7f0000000240)="1d17833bd9b40ca9b7943b0827bf42ebfbf0a3379a9fe16919a63ee1128a469c4b6c1bae2ec10b7770152b499357e4bb41fc5a51b5387f45ff823e6ad4ed63fb41a4e35af22f6ad875fd83b2e21272bc1cbb6ea52357261ad91a9f6069ad03c5d3c2f7944156f657c36d694b", 0x6c}], 0x4}, 0x40040c0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@o_path={&(0x7f0000000500)='./file0\x00', 0x0, 0x4000, r0}, 0x18) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000600)='cgroup.controllers\x00', 0x0, 0x0) 11:17:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000804}, 0x4000000) 11:17:52 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000600)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', r2, r1, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x31, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 11:17:52 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1009.099653][T27672] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.111373][T27672] bridge0: port 1(bridge_slave_0) entered disabled state 11:17:52 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000600)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', r2, r1, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x31, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 11:17:52 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 1009.145516][T27672] device bridge_slave_0 entered promiscuous mode 11:17:52 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000480)='cpu.pressure\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)=@o_path={&(0x7f0000000340)='./file0\x00', r0, 0x4000, r1}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000000)=@llc={0x1a, 0x4, 0xff, 0x1f, 0x0, 0x2, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="b83416b2370ff25fedea39ba339226163ddc088ed86d0d7bddf8acb0ada1dc288ab4054ebd9fa3019c7a5b3126d455d8a56110089a92d547d7619a3134d655d38c9880602c0ea42dfef2589e3398593361e6eba20c9a65984e535c2795980df407d167fb64e4125c7e6a173c507795e92dcfb4b3168f4b649c3154f86c55981cedf0eee5c9edbb08fd3e2339c3abee37f30fd4ef68c5b58f9a010cc6", 0x9c}, {&(0x7f0000000140)="cdfd9c1e3437e598c33187404b9678d0751e6282b88f10f5d84f416ebc58d802f2456c80f277e7abbeea0eb1e33a7db74a90be61ba374c7df59c158ed269bb5942c0c8a964b59a23e4a1a04e00313c801b6b45eab8b109ad44e78722a3fb27c91fff52862ba6bd99a5b460c4d8f2dfedb993fc5e5881761b013ad3afc6fd3e7760c743666f187eb999610c", 0x8b}, {&(0x7f0000000200)="a57ee6f9dd9035935562f42675889c02d22e33b20f803c924f8e99ec34217b3575be79986d7014975418b5dc7b32384ed6f0", 0x32}, {&(0x7f0000000240)="1d17833bd9b40ca9b7943b0827bf42ebfbf0a3379a9fe16919a63ee1128a469c4b6c1bae2ec10b7770152b499357e4bb41fc5a51b5387f45ff823e6ad4ed63fb41a4e35af22f6ad875fd83b2e21272bc1cbb6ea52357261ad91a9f6069ad03c5d3c2f7944156f657c36d694b", 0x6c}], 0x4}, 0x40040c0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@o_path={&(0x7f0000000500)='./file0\x00', 0x0, 0x4000, r0}, 0x18) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000600)='cgroup.controllers\x00', 0x0, 0x0) 11:17:52 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000600)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', r2, r1, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x31, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 11:17:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000804}, 0x4000000) 11:17:52 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:52 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000600)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', r2, r1, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x31, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}, 0x40) 11:17:52 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2300, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000804}, 0x4000000) [ 1009.662266][T27672] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.669532][T27672] bridge0: port 2(bridge_slave_1) entered disabled state 11:17:53 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) [ 1009.704317][T27672] device bridge_slave_1 entered promiscuous mode 11:17:53 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000003c0), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r1}, 0x4) 11:17:53 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:53 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x4000804}, 0x4000000) 11:17:53 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:53 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000003c0), 0x0}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r1}, 0x4) 11:17:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x4000804}, 0x4000000) [ 1010.092104][T27510] Bluetooth: hci2: command 0x041b tx timeout [ 1010.116918][T27672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 11:17:53 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:53 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xa}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8feb}}], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0x401, 0x2}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000200)=[r0, r0], &(0x7f0000000240)=[{0x1, 0x1, 0xa, 0xc}, {0x1, 0x1, 0x10, 0x3}, {0x2, 0x2, 0x0, 0x1}, {0x2, 0x4, 0x9, 0x6}, {0x2, 0x5, 0x3, 0x7}, {0x0, 0x2, 0x6, 0xa}, {0x3, 0x1, 0x3, 0x3}, {0x0, 0x1, 0x5, 0xa}, {0x3, 0x1, 0x4, 0x9}, {0x2, 0x4, 0x10, 0x4}], 0x10, 0x1000}, 0x90) 11:17:53 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 11:17:53 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x4000804}, 0x4000000) 11:17:53 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:53 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:54 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xa}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8feb}}], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0x401, 0x2}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000200)=[r0, r0], &(0x7f0000000240)=[{0x1, 0x1, 0xa, 0xc}, {0x1, 0x1, 0x10, 0x3}, {0x2, 0x2, 0x0, 0x1}, {0x2, 0x4, 0x9, 0x6}, {0x2, 0x5, 0x3, 0x7}, {0x0, 0x2, 0x6, 0xa}, {0x3, 0x1, 0x3, 0x3}, {0x0, 0x1, 0x5, 0xa}, {0x3, 0x1, 0x4, 0x9}, {0x2, 0x4, 0x10, 0x4}], 0x10, 0x1000}, 0x90) 11:17:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}], 0x10}, 0x4000000) [ 1010.779048][T27672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:17:54 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:54 executing program 1: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) (async) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000480)='cpu.pressure\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)=@o_path={&(0x7f0000000340)='./file0\x00', r0, 0x4000, r1}, 0x18) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) (async) r2 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000000)=@llc={0x1a, 0x4, 0xff, 0x1f, 0x0, 0x2, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="b83416b2370ff25fedea39ba339226163ddc088ed86d0d7bddf8acb0ada1dc288ab4054ebd9fa3019c7a5b3126d455d8a56110089a92d547d7619a3134d655d38c9880602c0ea42dfef2589e3398593361e6eba20c9a65984e535c2795980df407d167fb64e4125c7e6a173c507795e92dcfb4b3168f4b649c3154f86c55981cedf0eee5c9edbb08fd3e2339c3abee37f30fd4ef68c5b58f9a010cc6", 0x9c}, {&(0x7f0000000140)="cdfd9c1e3437e598c33187404b9678d0751e6282b88f10f5d84f416ebc58d802f2456c80f277e7abbeea0eb1e33a7db74a90be61ba374c7df59c158ed269bb5942c0c8a964b59a23e4a1a04e00313c801b6b45eab8b109ad44e78722a3fb27c91fff52862ba6bd99a5b460c4d8f2dfedb993fc5e5881761b013ad3afc6fd3e7760c743666f187eb999610c", 0x8b}, {&(0x7f0000000200)="a57ee6f9dd9035935562f42675889c02d22e33b20f803c924f8e99ec34217b3575be79986d7014975418b5dc7b32384ed6f0", 0x32}, {&(0x7f0000000240)="1d17833bd9b40ca9b7943b0827bf42ebfbf0a3379a9fe16919a63ee1128a469c4b6c1bae2ec10b7770152b499357e4bb41fc5a51b5387f45ff823e6ad4ed63fb41a4e35af22f6ad875fd83b2e21272bc1cbb6ea52357261ad91a9f6069ad03c5d3c2f7944156f657c36d694b", 0x6c}], 0x4}, 0x40040c0) (async, rerun: 64) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@o_path={&(0x7f0000000500)='./file0\x00', 0x0, 0x4000, r0}, 0x18) (async, rerun: 64) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000600)='cgroup.controllers\x00', 0x0, 0x0) 11:17:54 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x10}}], 0x10}, 0x0) 11:17:54 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) [ 1011.091342][T27672] team0: Port device team_slave_0 added [ 1011.121050][T27672] team0: Port device team_slave_1 added 11:17:54 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:54 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:54 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5}, 0x38) 11:17:54 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:54 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1011.397833][T27672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1011.407523][T27672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:17:54 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5}, 0x38) 11:17:54 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) (async) r2 = socket$kcm(0x29, 0x5, 0x0) (async) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) [ 1011.532096][T27672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 11:17:55 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) [ 1011.615528][T27672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1011.639345][T27672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:17:55 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1011.741974][T27672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 11:17:55 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000000)="ebe8ecd4e62e01fc4ce0142274a085601bc2456d6ffaef389c037f8123ada1248a0339da80ff42bd8bef9c9758f2fbff58112565c65bd5aef36ecba75cd9bf7d786642b4bc3f5b01d847713546100c08b03bb1bf3e1c4cfb5d2ca8972879e36b955beb8390939220b007e4637bc5d2d6dbc4a6769ce851325bd443e493123bba603b59f8487df782f82826ab2a83ea4bb437573e9a9a5d8ca6ffeab88fa6bc2af7b7784af54f9bc60f98d9d7547a155c094509f3c7e11dd24d71ac7c9eb29680964c559afc1565b4379f354101409da9323252dd51647a28cd4586fc72013e72395efdb118911076dd4ff8215c0618209a1534aa7fe187", &(0x7f0000000400)=""/126, &(0x7f0000000180)="d663f4f4e3781e73fc3787b2be55a4943fb3d23699abb2ab66903e42411c31ee634c5c766d8c383b0fbda32a72bb3b6fe1c94af8aad5be1ef4968c5fcf8a5443bc33f36df62a699e62ed9eb701324d8c04233ee0b8acd6f34a960082914caa380cb97f1c7d5e291619f76ce8605f9d4a822348f12c88f88c5ab262a81ac50148bc5d057d42f1f42df5243100b09f376e7ae7dec86ca1c5076ebf708c7676aba1155bc1fe4caf82223ff2bb583ca2f1c5f3a4d2235b49ccd7b8b0515615ae8e73d62c76ba7d94db2dcb1f8961f7003501242f", &(0x7f0000000280)="4fd447075ab331c7cbe122de3e0f909d499c2f2793b17c61ad6980036474db88b6d9dd6ceb39009555192adf5f016d82df5a215b9122cf35e60a9ed366a64c55335a91b1fe461d25445740fd268faf134df48933907e09a5d027816f3c30ee153338dd33086c8011a5f54d15b5817a2e0654e4344d005641bd9385d0090ea9c3bf49bba97164bdf76c0e98a8fb0e27cc8c9305f546e3e096b4c04abe6cd44261ebce230652946f68e1824aeba6ae4c2b0609f7cf183e5244b11df344bcb517a3a7b74f03a317a0cc57fc112df860440b215d04636f97b7feabbcbbad1e0cfcb00bee9e6f3b4fe700d3ca6aa85f3a2d0eded96069", 0xff, r0, 0x4}, 0x38) 11:17:55 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5}, 0x38) 11:17:55 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:55 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:55 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:55 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) [ 1012.164412][T27514] Bluetooth: hci2: command 0x040f tx timeout 11:17:55 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:55 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r3, r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) 11:17:55 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:55 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000000)="ebe8ecd4e62e01fc4ce0142274a085601bc2456d6ffaef389c037f8123ada1248a0339da80ff42bd8bef9c9758f2fbff58112565c65bd5aef36ecba75cd9bf7d786642b4bc3f5b01d847713546100c08b03bb1bf3e1c4cfb5d2ca8972879e36b955beb8390939220b007e4637bc5d2d6dbc4a6769ce851325bd443e493123bba603b59f8487df782f82826ab2a83ea4bb437573e9a9a5d8ca6ffeab88fa6bc2af7b7784af54f9bc60f98d9d7547a155c094509f3c7e11dd24d71ac7c9eb29680964c559afc1565b4379f354101409da9323252dd51647a28cd4586fc72013e72395efdb118911076dd4ff8215c0618209a1534aa7fe187", &(0x7f0000000400)=""/126, &(0x7f0000000180)="d663f4f4e3781e73fc3787b2be55a4943fb3d23699abb2ab66903e42411c31ee634c5c766d8c383b0fbda32a72bb3b6fe1c94af8aad5be1ef4968c5fcf8a5443bc33f36df62a699e62ed9eb701324d8c04233ee0b8acd6f34a960082914caa380cb97f1c7d5e291619f76ce8605f9d4a822348f12c88f88c5ab262a81ac50148bc5d057d42f1f42df5243100b09f376e7ae7dec86ca1c5076ebf708c7676aba1155bc1fe4caf82223ff2bb583ca2f1c5f3a4d2235b49ccd7b8b0515615ae8e73d62c76ba7d94db2dcb1f8961f7003501242f", &(0x7f0000000280)="4fd447075ab331c7cbe122de3e0f909d499c2f2793b17c61ad6980036474db88b6d9dd6ceb39009555192adf5f016d82df5a215b9122cf35e60a9ed366a64c55335a91b1fe461d25445740fd268faf134df48933907e09a5d027816f3c30ee153338dd33086c8011a5f54d15b5817a2e0654e4344d005641bd9385d0090ea9c3bf49bba97164bdf76c0e98a8fb0e27cc8c9305f546e3e096b4c04abe6cd44261ebce230652946f68e1824aeba6ae4c2b0609f7cf183e5244b11df344bcb517a3a7b74f03a317a0cc57fc112df860440b215d04636f97b7feabbcbbad1e0cfcb00bee9e6f3b4fe700d3ca6aa85f3a2d0eded96069", 0xff, r0, 0x4}, 0x38) 11:17:55 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xa000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:55 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) socket$kcm(0x29, 0x5, 0x0) [ 1012.424243][T27672] device hsr_slave_0 entered promiscuous mode [ 1012.445069][T27672] device hsr_slave_1 entered promiscuous mode 11:17:55 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xc9, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x15, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000007f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085200000050000001831000005000000000000000000000018210000", @ANYRES32=r0, @ANYBLOB="00000000030000001c98000010000000bf91000000000000b7020000000000008500000085000000b70000000000000095b4000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x36, &(0x7f0000000180)=""/54, 0x41000, 0x46, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0xc, 0x0, 0xa8}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f00000005c0)=[0xffffffffffffffff, r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000600)=[{0x0, 0x3, 0xc, 0x6}, {0x4, 0x4, 0xe}, {0x1, 0x5, 0xc, 0xc}], 0x10, 0xdd6}, 0x90) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x12, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x93}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000b80)='GPL\x00', 0xa4c00000, 0x1b, &(0x7f0000000bc0)=""/27, 0x40f00, 0x22, '\x00', r2, 0x0, r5, 0x8, &(0x7f0000000c00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0xf, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000c80)=[0xffffffffffffffff, r0, r0, r1, r0, r1, r1, r1], &(0x7f0000000cc0)=[{0x1, 0x3, 0xc, 0x4}, {0x4, 0x1, 0x0, 0x6}, {0x0, 0x2, 0xf, 0x4}], 0x10, 0x9}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x81, 0x0, r1, 0x2ca3, '\x00', r2, 0xffffffffffffffff, 0x2, 0x3, 0x1}, 0x48) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)=@generic={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001380)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000540)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000580)='GPL\x00', 0x1ca, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001280)={0x5, 0x8, 0x20, 0x7f80}, 0x10, 0x1e360, r4, 0x0, &(0x7f0000001340)=[r7, r0, r1, r7, r8, r7, r0, r1, r0, r1], 0x0, 0x10, 0x8}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x80000001, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x0, 0x5}, 0x48) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001080)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x9, '\x00', r2, r5, 0x0, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x8, 0x21, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@printk={@i}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfe9}}, @alu={0x4, 0x0, 0x9, 0x6, 0x2, 0x2, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xa, 0x4, 0x7, 0x50, 0x10}, @call, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @generic={0x80, 0xa, 0x4, 0x9, 0x2}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}]}, &(0x7f0000000f00)='syzkaller\x00', 0x7, 0x2f, &(0x7f0000000f40)=""/47, 0x40f00, 0x21, '\x00', r2, 0x14, r5, 0x8, &(0x7f0000000f80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0xa, 0x80, 0x1000}, 0x10, r3, r6, 0x2, &(0x7f0000001100)=[r0, r9, r10], &(0x7f0000001140)=[{0x2, 0x1, 0x7, 0x1}, {0x3, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0xb}], &(0x7f0000000740)='GPL\x00', 0x6, 0x81, &(0x7f0000000780)=""/129, 0x40f00, 0x6, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000880)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, r7, r1, r0, r1], &(0x7f0000000980)=[{0x5, 0x5, 0xe, 0x4}, {0x4, 0x1, 0x2, 0x5}, {0x5, 0x4, 0x7, 0x8}, {0x2, 0x2, 0xd, 0x3}, {0x0, 0x4, 0xf, 0x1}], 0x10, 0x8}, 0x90) 11:17:56 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) socket$kcm(0x29, 0x5, 0x0) [ 1012.602477][T27672] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1012.621932][T27672] Cannot create hsr debugfs directory 11:17:56 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) socket$kcm(0x29, 0x5, 0x0) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:56 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xc9, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x15, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000007f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085200000050000001831000005000000000000000000000018210000", @ANYRES32=r0, @ANYBLOB="00000000030000001c98000010000000bf91000000000000b7020000000000008500000085000000b70000000000000095b4000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x36, &(0x7f0000000180)=""/54, 0x41000, 0x46, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0xc, 0x0, 0xa8}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f00000005c0)=[0xffffffffffffffff, r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000600)=[{0x0, 0x3, 0xc, 0x6}, {0x4, 0x4, 0xe}, {0x1, 0x5, 0xc, 0xc}], 0x10, 0xdd6}, 0x90) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x12, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x93}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000b80)='GPL\x00', 0xa4c00000, 0x1b, &(0x7f0000000bc0)=""/27, 0x40f00, 0x22, '\x00', r2, 0x0, r5, 0x8, &(0x7f0000000c00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0xf, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000c80)=[0xffffffffffffffff, r0, r0, r1, r0, r1, r1, r1], &(0x7f0000000cc0)=[{0x1, 0x3, 0xc, 0x4}, {0x4, 0x1, 0x0, 0x6}, {0x0, 0x2, 0xf, 0x4}], 0x10, 0x9}, 0x90) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x81, 0x0, r1, 0x2ca3, '\x00', r2, 0xffffffffffffffff, 0x2, 0x3, 0x1}, 0x48) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)=@generic={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001380)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000540)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000580)='GPL\x00', 0x1ca, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001280)={0x5, 0x8, 0x20, 0x7f80}, 0x10, 0x1e360, r4, 0x0, &(0x7f0000001340)=[r7, r0, r1, r7, r8, r7, r0, r1, r0, r1], 0x0, 0x10, 0x8}, 0x90) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x80000001, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x0, 0x5}, 0x48) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001080)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x9, '\x00', r2, r5, 0x0, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x8, 0x21, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@printk={@i}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfe9}}, @alu={0x4, 0x0, 0x9, 0x6, 0x2, 0x2, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xa, 0x4, 0x7, 0x50, 0x10}, @call, @map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @generic={0x80, 0xa, 0x4, 0x9, 0x2}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}]}, &(0x7f0000000f00)='syzkaller\x00', 0x7, 0x2f, &(0x7f0000000f40)=""/47, 0x40f00, 0x21, '\x00', r2, 0x14, r5, 0x8, &(0x7f0000000f80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0xa, 0x80, 0x1000}, 0x10, r3, r6, 0x2, &(0x7f0000001100)=[r0, r9, r10], &(0x7f0000001140)=[{0x2, 0x1, 0x7, 0x1}, {0x3, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x1, &(0x7f0000000700)=@raw=[@call={0x85, 0x0, 0x0, 0xb}], &(0x7f0000000740)='GPL\x00', 0x6, 0x81, &(0x7f0000000780)=""/129, 0x40f00, 0x6, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000880)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, r7, r1, r0, r1], &(0x7f0000000980)=[{0x5, 0x5, 0xe, 0x4}, {0x4, 0x1, 0x2, 0x5}, {0x5, 0x4, 0x7, 0x8}, {0x2, 0x2, 0xd, 0x3}, {0x0, 0x4, 0xf, 0x1}], 0x10, 0x8}, 0x90) 11:17:56 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:56 executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) socket$kcm(0x29, 0x5, 0x0) 11:17:56 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xb000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:56 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:56 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:56 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:56 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xc000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:56 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000700), &(0x7f00000007c0)=r3}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000880)='syzkaller\x00', 0xff3, 0x0, &(0x7f00000008c0), 0x41100, 0x58, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000900)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0xd, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r4, r1, r1, r1], 0xfffffffffffffffe, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000a80)=[0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa9, &(0x7f0000000b00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0x30, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x2c, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7c34}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_val={0x18, 0xa, 0x2, 0x0, r0}, @func, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x1ff}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7a}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @alu={0x7, 0x1, 0x0, 0xa, 0x5, 0xfffffffffffffff8, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xd9, &(0x7f0000000280)=""/217, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0x3, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000580)=[r5, r0], &(0x7f00000005c0)=[{0x1, 0x1, 0x8, 0x9}, {0x4, 0x4, 0x9, 0x8}, {0x0, 0x2, 0x4}, {0x2, 0x4, 0x1ff}, {0x2, 0x3, 0x1, 0xc}], 0x10, 0x6}, 0x90) 11:17:56 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:56 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:56 executing program 4: socket$kcm(0x29, 0x5, 0x0) 11:17:56 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000080), &(0x7f0000000140)=r1}, 0x20) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:56 executing program 3: socket$kcm(0x29, 0x0, 0x0) 11:17:56 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xd000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:57 executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:57 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:57 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:57 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xe000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:57 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:57 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xf000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:57 executing program 4: socket$kcm(0x29, 0x0, 0x0) [ 1013.995513][T27672] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:17:57 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f0000000400)="ce29359fb4a482899bdfe654f2b95f907a1bdb40316fbc3f76b124de779abf2221930ac5f870b3983291c3587a26f0391b8b35d838ec5ef15d5d8c9898bba48cb527a09175a7d4ab8068ebf1ad10f42032490618", &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:57 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000700), &(0x7f00000007c0)=r3}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x5, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000880)='syzkaller\x00', 0xff3, 0x0, &(0x7f00000008c0), 0x41100, 0x58, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000900)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0xd, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r4, r1, r1, r1], 0xfffffffffffffffe, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000a80)=[0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa9, &(0x7f0000000b00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0x30, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x2c, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7c34}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_val={0x18, 0xa, 0x2, 0x0, r0}, @func, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x1ff}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7a}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @alu={0x7, 0x1, 0x0, 0xa, 0x5, 0xfffffffffffffff8, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xd9, &(0x7f0000000280)=""/217, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0x3, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000580)=[r5, r0], &(0x7f00000005c0)=[{0x1, 0x1, 0x8, 0x9}, {0x4, 0x4, 0x9, 0x8}, {0x0, 0x2, 0x4}, {0x2, 0x4, 0x1ff}, {0x2, 0x3, 0x1, 0xc}], 0x10, 0x6}, 0x90) 11:17:57 executing program 1: socket$kcm(0x29, 0x0, 0x0) 11:17:57 executing program 4: socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:57 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) socketpair(0xa, 0x80000, 0x9, &(0x7f00000001c0)) [ 1014.242012][T27546] Bluetooth: hci2: command 0x0419 tx timeout 11:17:57 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 11:17:57 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x10000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:57 executing program 4: socketpair(0x0, 0x80000, 0x9, &(0x7f00000001c0)) 11:17:57 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x11000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) [ 1014.631809][T27672] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:17:58 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:58 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 11:17:58 executing program 0: socketpair(0x0, 0x0, 0x9, &(0x7f00000001c0)) 11:17:58 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x12000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:58 executing program 3: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 11:17:58 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 11:17:58 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x13000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:58 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) 11:17:58 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 11:17:58 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) [ 1015.154495][T27672] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:17:58 executing program 4: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x14000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:58 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, &(0x7f0000000480)=""/122, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:58 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) 11:17:58 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x15000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:17:58 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:58 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:58 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) 11:17:59 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)="e72058bb1721d18355949115fe72f4fcfb102349378613244ca5a857dd85ef9e8001c4f848f96d6445893b759dc091237403b548ae138c8b44321471aba4eecf9575a1c3211c8be1645569fadb1bc7124e54709edaec097337d7a6aef72ed66fccc711459acfa8526af5650c9469eefb03aa", &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:59 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:17:59 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:17:59 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000580)="ae2c494839cd58fb77ced3c12c6d92d1f3d3641e2fdd384bcd4a976f5eab8405e244a3383d1ebff8203d293671e4ed453a9736cd53f03cab8c086749d72bf87f8b9e3df6a70f3444", 0x5, r0}, 0x38) 11:18:00 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:00 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:00 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x5, r0}, 0x38) 11:18:00 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:00 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1017.533339][T27672] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 11:18:00 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x5, r0}, 0x38) 11:18:01 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:01 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:01 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 11:18:02 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:02 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:02 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:02 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) [ 1019.263275][T27672] netdevsim netdevsim2 netdevsim0: renamed from eth0 11:18:03 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}, 0x38) 11:18:03 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:03 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:03 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r3, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:04 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:04 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:04 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}, 0x38) 11:18:04 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r3, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:05 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:05 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0}, 0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}, 0x38) 11:18:05 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:05 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:06 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:06 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:06 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:07 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:07 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:07 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:08 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) [ 1024.893454][T27672] netdevsim netdevsim2 netdevsim1: renamed from eth1 11:18:08 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:09 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:09 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1026.107323][T27672] netdevsim netdevsim2 netdevsim2: renamed from eth2 11:18:09 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:10 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1027.204893][T27672] netdevsim netdevsim2 netdevsim3: renamed from eth3 11:18:10 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1028.089359][T27672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1028.157794][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1028.173437][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1028.206830][T27672] 8021q: adding VLAN 0 to HW filter on device team0 [ 1028.259444][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:18:11 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1028.302779][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1028.329453][T27546] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.336592][T27546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.389213][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1028.420912][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1028.456131][T27546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.463278][T27546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1028.522441][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1028.530582][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1028.565435][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1028.588476][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1028.623052][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1028.639834][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1028.663033][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1028.671737][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1028.736564][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1028.758895][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1028.782801][T23583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1028.795445][T27672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1028.838057][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:18:12 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1029.264575][T27672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1029.363438][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1029.373522][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 11:18:12 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1029.414700][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1029.423545][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1029.488182][T27672] device veth0_vlan entered promiscuous mode [ 1029.540354][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1029.549007][T27519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1029.585234][T27672] device veth1_vlan entered promiscuous mode [ 1029.612865][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1029.620892][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1029.672762][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1029.730185][T27672] device veth0_macvtap entered promiscuous mode [ 1029.805610][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1029.814730][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1029.839653][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1029.865563][T27672] device veth1_macvtap entered promiscuous mode [ 1029.892765][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1029.901035][T27534] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 11:18:13 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1029.944028][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.992287][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.022507][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.043832][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.062035][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.082295][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.122461][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.141993][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.172167][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.221908][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.231790][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.282503][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.330185][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.369868][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.392220][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.431908][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.441772][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1030.521917][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.544097][T27672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1030.582646][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1030.591671][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1030.649474][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.682514][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.732402][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.751922][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.761778][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.821927][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.852312][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.885201][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.942176][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.972824][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.995136][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1031.042239][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1031.064667][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1031.118323][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1031.162161][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1031.192363][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1031.223853][T27672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1031.272145][T27672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1031.308214][T27672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1031.342120][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1031.351554][T27546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 11:18:14 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1031.394190][T27672] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.442706][T27672] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.451464][T27672] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.489415][T27672] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:18:14 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:15 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:16 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:16 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:16 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:17 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:18:18 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:18 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:18 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1035.212512][ T3606] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1035.220647][ T3606] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1035.267299][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1035.275478][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1035.336668][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 11:18:18 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9a, '\x00', 0x0, r1, 0x0, 0x10001}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) [ 1035.378003][T27510] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:18:18 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:19 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x4, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0xfffffff8, 0x5}, {0x3, 0x951, 0x200}], '*'}, @const={0x5}]}, {0x0, [0x10, 0x61]}}, &(0x7f0000000140)=""/85, 0x50, 0x55, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) 11:18:19 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:19 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) 11:18:20 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r13, 0x0, r14, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r12], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:20 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:20 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:20 executing program 3: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) 11:18:21 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:21 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:22 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:22 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) 11:18:22 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:22 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r13, 0x0, r14, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r12], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:23 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:23 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r13, 0x0, r14, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r12], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:24 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:24 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:24 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) 11:18:25 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:25 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:25 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:25 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1043.695957][T13591] device hsr_slave_0 left promiscuous mode [ 1043.719157][T13591] device hsr_slave_1 left promiscuous mode [ 1043.740279][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1043.751642][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1044.194414][T13591] device bridge_slave_1 left promiscuous mode [ 1044.200701][T13591] bridge0: port 2(bridge_slave_1) entered disabled state 11:18:27 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1044.257987][T13591] device bridge_slave_0 left promiscuous mode [ 1044.265617][T13591] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.763615][T13591] device hsr_slave_0 left promiscuous mode 11:18:29 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:29 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1046.902176][T13591] device hsr_slave_1 left promiscuous mode 11:18:30 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:30 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1047.602468][T23583] Bluetooth: hci2: command 0x0409 tx timeout 11:18:31 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1048.277578][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 11:18:31 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:32 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1049.323474][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1049.351787][T13591] device bridge_slave_1 left promiscuous mode [ 1049.362503][T13591] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.682395][T27534] Bluetooth: hci2: command 0x041b tx timeout [ 1049.925156][T28461] cgroup: fork rejected by pids controller in /syz0 11:18:33 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:33 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:33 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1050.830657][T13591] device bridge_slave_0 left promiscuous mode [ 1050.837887][T13591] bridge0: port 1(bridge_slave_0) entered disabled state 11:18:34 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1051.442306][T13591] device hsr_slave_0 left promiscuous mode 11:18:34 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1051.531485][T13591] device hsr_slave_1 left promiscuous mode [ 1051.542886][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1051.568855][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1051.596770][T13591] device bridge_slave_1 left promiscuous mode [ 1051.619547][T13591] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.644685][T13591] device bridge_slave_0 left promiscuous mode [ 1051.650934][T13591] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.772498][T23583] Bluetooth: hci2: command 0x040f tx timeout 11:18:35 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:35 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1052.344270][T13591] device hsr_slave_0 left promiscuous mode [ 1052.426947][T13591] device hsr_slave_1 left promiscuous mode 11:18:36 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1053.852365][T27519] Bluetooth: hci2: command 0x0419 tx timeout 11:18:37 executing program 4: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 1054.325508][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.331975][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.340141][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1054.362033][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1055.275569][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1055.301600][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 11:18:39 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:39 executing program 1: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:18:39 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:39 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1056.658445][T13591] device bridge_slave_1 left promiscuous mode [ 1056.667467][T13591] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.746755][T13591] device bridge_slave_0 left promiscuous mode [ 1056.758183][T13591] bridge0: port 1(bridge_slave_0) entered disabled state 11:18:40 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1056.993037][T13591] device hsr_slave_0 left promiscuous mode 11:18:40 executing program 1: syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:18:40 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 1057.352885][T13591] device hsr_slave_1 left promiscuous mode [ 1057.896104][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1057.916613][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 11:18:41 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1058.965513][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1058.992395][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 11:18:43 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:43 executing program 4: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1060.159187][T13591] device bridge_slave_1 left promiscuous mode [ 1060.165681][T13591] bridge0: port 2(bridge_slave_1) entered disabled state 11:18:44 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r13, 0x0, r14, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r12], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:44 executing program 3: syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1061.939609][T13591] device bridge_slave_0 left promiscuous mode [ 1061.949224][T13591] bridge0: port 1(bridge_slave_0) entered disabled state 11:18:45 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:47 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:47 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:47 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:18:47 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:18:47 executing program 4: syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1064.674663][T13591] device hsr_slave_0 left promiscuous mode [ 1065.367767][T13591] device hsr_slave_1 left promiscuous mode 11:18:49 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1066.828825][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1066.842055][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1067.686514][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1067.715569][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1068.668325][T13591] device bridge_slave_1 left promiscuous mode [ 1068.696840][T13591] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.975318][T13591] device bridge_slave_0 left promiscuous mode [ 1069.981686][T13591] bridge0: port 1(bridge_slave_0) entered disabled state 11:18:55 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r13, 0x0, r14, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r12], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1073.795220][T13591] device hsr_slave_0 left promiscuous mode [ 1074.917736][T13591] device hsr_slave_1 left promiscuous mode 11:18:58 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1075.065907][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1075.092788][T13591] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1075.128846][T13591] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1075.174385][T13591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1075.795827][T13591] device bridge_slave_1 left promiscuous mode [ 1075.817411][T13591] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.746715][T13591] device bridge_slave_0 left promiscuous mode [ 1076.754177][T13591] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.115673][T13591] device veth0_vlan left promiscuous mode 11:19:01 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1080.558121][T13591] device veth1_macvtap left promiscuous mode [ 1080.566373][T13591] device veth0_macvtap left promiscuous mode [ 1080.600484][T13591] device veth1_vlan left promiscuous mode [ 1080.624962][T13591] device veth0_vlan left promiscuous mode 11:19:05 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r8 = gettid() r9 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r6, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r7, r5]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, r5, r5]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r8, r10, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1083.656489][T13591] device veth1_macvtap left promiscuous mode [ 1083.674773][T13591] device veth0_macvtap left promiscuous mode [ 1083.695568][T13591] device veth1_vlan left promiscuous mode [ 1083.738593][T13591] device veth0_vlan left promiscuous mode 11:19:08 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1085.237749][T13591] device veth1_macvtap left promiscuous mode [ 1085.245997][T13591] device veth0_macvtap left promiscuous mode [ 1085.255354][T13591] device veth1_vlan left promiscuous mode [ 1085.261271][T13591] device veth0_vlan left promiscuous mode 11:19:10 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r8 = gettid() r9 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r6, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r7, r5]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, r5, r5]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1087.132052][T27519] Bluetooth: hci3: command 0x0406 tx timeout [ 1088.539566][T13591] device veth1_macvtap left promiscuous mode [ 1088.552123][T13591] device veth0_macvtap left promiscuous mode [ 1088.560140][T13591] device veth1_vlan left promiscuous mode [ 1088.612002][T13591] device veth0_vlan left promiscuous mode 11:19:13 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:13 executing program 4: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 11:19:14 executing program 1: syz_clone(0x0, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:19:17 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r8 = gettid() r9 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r6, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r7, r5]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, r5, r5]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1093.772291][T27546] Bluetooth: hci0: command 0x0409 tx timeout [ 1093.841984][T27546] Bluetooth: hci1: command 0x0409 tx timeout 11:19:17 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1095.843459][T27519] Bluetooth: hci0: command 0x041b tx timeout [ 1095.922253][T27519] Bluetooth: hci1: command 0x041b tx timeout [ 1097.932194][T27534] Bluetooth: hci0: command 0x040f tx timeout [ 1098.011971][T27534] Bluetooth: hci1: command 0x040f tx timeout 11:19:21 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1098.401986][T27534] Bluetooth: hci5: command 0x0409 tx timeout [ 1100.002015][T23923] Bluetooth: hci0: command 0x0419 tx timeout [ 1100.082041][T23923] Bluetooth: hci1: command 0x0419 tx timeout [ 1100.492584][T23923] Bluetooth: hci5: command 0x041b tx timeout 11:19:25 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r8 = gettid() r9 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r6, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r7, r5]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, r5, r5]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1102.561993][T22031] Bluetooth: hci5: command 0x040f tx timeout [ 1104.641941][T23923] Bluetooth: hci5: command 0x0419 tx timeout 11:19:30 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r1, 0x58, &(0x7f0000001d00)}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:34 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:36 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1113.762175][ T3577] Bluetooth: hci6: command 0x0409 tx timeout 11:19:38 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1115.766877][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.773359][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1115.852031][ T3561] Bluetooth: hci6: command 0x041b tx timeout 11:19:41 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r4 = gettid() r5 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r9 = gettid() r10 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r8, r6]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r6, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r9, r11, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1117.931911][ T3561] Bluetooth: hci6: command 0x040f tx timeout [ 1120.012205][T23583] Bluetooth: hci6: command 0x0419 tx timeout 11:19:43 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:45 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:48 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:49 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:51 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:52 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:54 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:55 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:56 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:57 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:19:59 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:00 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:01 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:02 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:03 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:05 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:06 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:07 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:08 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:08 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1146.006892][T13591] team0 (unregistering): Port device team_slave_1 removed 11:20:09 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1146.432690][T13591] team0 (unregistering): Port device team_slave_0 removed [ 1146.795228][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1147.017363][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 11:20:10 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:10 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:11 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:12 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:12 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:13 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:13 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:14 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1150.782681][T13591] bond0 (unregistering): Released all slaves 11:20:14 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:15 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:15 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:16 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:16 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:17 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:17 executing program 1: syz_open_procfs$namespace(0x0, 0x0) 11:20:18 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1155.543526][T13591] team0 (unregistering): Port device team_slave_1 removed 11:20:18 executing program 1: syz_open_procfs$namespace(0x0, 0x0) 11:20:19 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1155.837975][T13591] team0 (unregistering): Port device team_slave_0 removed [ 1155.875039][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1155.903671][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 11:20:20 executing program 1: syz_open_procfs$namespace(0x0, 0x0) 11:20:20 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:21 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1158.948046][T13591] bond0 (unregistering): Released all slaves 11:20:22 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1159.612124][T23583] Bluetooth: hci3: command 0x0409 tx timeout [ 1159.682004][T23923] Bluetooth: hci7: command 0x0409 tx timeout 11:20:23 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) 11:20:24 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1161.691920][T23583] Bluetooth: hci3: command 0x041b tx timeout [ 1161.772191][T23583] Bluetooth: hci7: command 0x041b tx timeout 11:20:25 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:20:25 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:26 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") 11:20:27 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1163.771854][T27534] Bluetooth: hci3: command 0x040f tx timeout [ 1163.851867][T23583] Bluetooth: hci7: command 0x040f tx timeout [ 1164.091847][T27519] Bluetooth: hci8: command 0x0409 tx timeout 11:20:27 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) 11:20:28 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1165.072360][T13591] team0 (unregistering): Port device team_slave_1 removed [ 1165.416680][T13591] team0 (unregistering): Port device team_slave_0 removed 11:20:28 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1165.825425][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1165.841934][ T1069] Bluetooth: hci3: command 0x0419 tx timeout [ 1165.921955][ T1069] Bluetooth: hci7: command 0x0419 tx timeout 11:20:29 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1166.080478][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1166.162021][T22031] Bluetooth: hci8: command 0x041b tx timeout 11:20:30 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r5 = gettid() r6 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r5, r7, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1167.411227][T13591] bond0 (unregistering): Released all slaves 11:20:31 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:31 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1168.242184][ T1069] Bluetooth: hci8: command 0x040f tx timeout 11:20:32 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1169.041982][T27534] Bluetooth: hci2: command 0x0406 tx timeout 11:20:33 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") [ 1170.322276][T27534] Bluetooth: hci8: command 0x0419 tx timeout 11:20:33 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:35 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) [ 1173.935372][T13591] team0 (unregistering): Port device team_slave_1 removed [ 1173.962473][T13591] team0 (unregistering): Port device team_slave_0 removed [ 1174.405314][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1174.893464][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 11:20:38 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:38 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) [ 1176.066310][T13591] bond0 (unregistering): Released all slaves 11:20:39 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:40 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1177.204991][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.211319][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 11:20:41 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1179.601978][T27519] Bluetooth: hci9: command 0x0409 tx timeout [ 1180.012654][T13591] team0 (unregistering): Port device team_slave_1 removed 11:20:43 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) [ 1180.191725][T13591] team0 (unregistering): Port device team_slave_0 removed [ 1180.847290][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 11:20:44 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1181.148281][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1181.301299][T13591] bond0 (unregistering): Released all slaves [ 1181.691901][ T1069] Bluetooth: hci9: command 0x041b tx timeout 11:20:46 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1183.761962][ T3577] Bluetooth: hci9: command 0x040f tx timeout [ 1185.842043][T23923] Bluetooth: hci9: command 0x0419 tx timeout 11:20:49 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1186.393036][T13591] team0 (unregistering): Port device team_slave_1 removed [ 1186.818657][T13591] team0 (unregistering): Port device team_slave_0 removed 11:20:50 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1187.443477][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1188.014528][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 11:20:52 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r4, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:52 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r18 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r18, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:53 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:54 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) close(r17) r19 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@tail_call, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x3e28, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r0, r0, r0]}, 0x90) r20 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001640)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r20, &(0x7f0000001680), 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_tracing={0x1a, 0x14, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffff840}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @jmp={0x5, 0x1, 0x5, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r17}}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x804}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x7e, 0x5, &(0x7f00000001c0)=""/5, 0x40f00, 0x46, '\x00', 0x0, 0x18, r18, 0x8, &(0x7f0000000240)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1350f, r19, 0x0, &(0x7f00000014c0)=[r8, r0, r0, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x7}, 0x90) [ 1191.012747][T13591] bond0 (unregistering): Released all slaves 11:20:55 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:55 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:56 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:56 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:57 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:57 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:58 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') 11:20:59 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r6 = gettid() r7 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r8, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r11 = gettid() r12 = syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") sendmsg$unix(r9, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r10, r8]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r8, r8, r8]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001e00)={&(0x7f0000001dc0)='afs_send_data\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={r11, r13, 0x0, 0x5, &(0x7f0000001e40)='syz1\x00'}, 0x30) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="8fc68d3856d256adbb417f74005415f67e1dfb3d53e1ae0d1e5db89c6e29a0157921856e09af8ccc1afff13f3105aafa4bb1f8784b071d13d6fd852a728b63", 0x3f}, {&(0x7f0000000100)="b3121221e82668ebb73d9285ced6a200d00b68b166473c3d1cd25d243924faea9829aa9c6d98d61196afc15c69a0fd65c6f46594a03a4309422561fa7584abde26fc167142c3e043ae15b2dc90328a8521eecaf596ad4fecd5d457f245a439824255f36db9c0f3d02fad6c6e1dfd63a185aea2acb17552349e3096d3aab48a13050e8818a049518b7a0c9fd9b4faaeb2b8c68c8dda5dcb4771792ec7e6910204b923a589fc5cd29d391576b370801b101210bb5a0cee6b3a61b59a6a584a289e4c125a7e60d42d80da056c8f52b90748a3d1cb2c1b", 0xd5}], 0x2, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r5, r3]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01}}}], 0xa8, 0x4000804}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001a40)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d80)={r3, 0x58, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e80)={&(0x7f00000030c0)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000030000000300000004000004090000000600000005000000400500000c00000001000000080000000f0000000100000009000000060000000400000001800000010000000000000b020000000100000000000001000000004d0023060f0000000000000802000000a6dac12b45e63064108c974662109402000000030000060400000008000000070000000a000000040000000d00000004000000003000"], &(0x7f0000001e80)=""/4096, 0xa3, 0x1000, 0x1, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', r15, 0x0, r16, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[r14], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[r0, r0, r0, r0], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) close(r17) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1196.354723][T13591] team0 (unregistering): Port device team_slave_1 removed [ 1196.388635][T13591] team0 (unregistering): Port device team_slave_0 removed [ 1196.742288][T13591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1197.042056][ T27] INFO: task kworker/0:14:27510 blocked for more than 143 seconds. [ 1197.050269][ T27] Not tainted 5.15.151-syzkaller #0 [ 1197.071880][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1197.080600][ T27] task:kworker/0:14 state:D stack:25048 pid:27510 ppid: 2 flags:0x00004000 [ 1197.103462][ T27] Workqueue: events linkwatch_event [ 1197.108895][ T27] Call Trace: [ 1197.112762][ T27] [ 1197.115736][ T27] __schedule+0x12c4/0x45b0 [ 1197.120379][ T27] ? mark_lock+0x98/0x340 [ 1197.131860][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1197.137997][ T27] ? __sched_text_start+0x8/0x8 [ 1197.151830][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1197.157422][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1197.173168][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1197.178430][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1197.191862][ T27] schedule+0x11b/0x1f0 [ 1197.196087][ T27] schedule_preempt_disabled+0xf/0x20 [ 1197.201490][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1197.211973][ T27] ? linkwatch_event+0xa/0x50 [ 1197.216734][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1197.228960][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1197.235367][ T27] ? print_irqtrace_events+0x210/0x210 [ 1197.240878][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1197.251865][ T27] mutex_lock_nested+0x17/0x20 [ 1197.256784][ T27] linkwatch_event+0xa/0x50 [ 1197.261306][ T27] process_one_work+0x8a1/0x10c0 [ 1197.271864][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1197.277558][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1197.291893][ T27] ? kthread_data+0x4e/0xc0 [ 1197.296763][ T27] ? wq_worker_running+0x97/0x170 [ 1197.311858][ T27] worker_thread+0xaca/0x1280 [ 1197.316623][ T27] kthread+0x3f6/0x4f0 [ 1197.320793][ T27] ? rcu_lock_release+0x20/0x20 [ 1197.331848][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1197.336497][ T27] ret_from_fork+0x1f/0x30 [ 1197.340978][ T27] [ 1197.351993][ T27] INFO: task kworker/0:16:27514 blocked for more than 143 seconds. [ 1197.360195][ T27] Not tainted 5.15.151-syzkaller #0 [ 1197.373906][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1197.393190][ T27] task:kworker/0:16 state:D stack:25184 pid:27514 ppid: 2 flags:0x00004000 [ 1197.411889][ T27] Workqueue: events switchdev_deferred_process_work [ 1197.418647][ T27] Call Trace: [ 1197.422439][ T27] [ 1197.425403][ T27] __schedule+0x12c4/0x45b0 [ 1197.429951][ T27] ? mark_lock+0x98/0x340 [ 1197.451881][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1197.458134][ T27] ? __sched_text_start+0x8/0x8 [ 1197.463437][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1197.468949][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1197.481847][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1197.487127][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1197.499256][ T27] schedule+0x11b/0x1f0 [ 1197.512106][ T27] schedule_preempt_disabled+0xf/0x20 [ 1197.517620][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1197.531896][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1197.538142][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1197.544859][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1197.551087][ T27] ? print_irqtrace_events+0x210/0x210 11:21:00 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() syz_clone(0xc97dc8308d900743, &(0x7f00000002c0)="b4ed6b57b0eed324d8401a8fd874878fc9f37c5eb8fdb28f853900365d215b82d8822315f4285de669f942013a9e15fb37db97c9dca853efb7f04f6a60c413f21a2c194ce8ecd436d74717b4b8e2", 0x4e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="24b78b") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0x1, 0x55a9, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003000)={0x11, 0x26, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018000000137700000000000007000000850000000e000000b7080000000000007b8af80000000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fdffffff180000009100000000000000410b0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000015c0)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000001cc0)=""/61, 0xb79191ca221aff26, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002ec0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002f00)={0x4, 0x8, 0x40, 0x8000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002f40)=[0xffffffffffffffff], &(0x7f0000002f80)=[{0x5, 0x4, 0xe, 0x4}, {0x3, 0x3, 0xd, 0xa}, {0x0, 0x5, 0xf, 0x8}, {0x1, 0x4, 0xa, 0x8}, {0x5, 0x4, 0x10, 0x6}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x7ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x18, &(0x7f0000001ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x714}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xef07}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x65, &(0x7f00000016c0)=""/101, 0x41000, 0x51, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840)={0x0, 0x4, 0x4fe6c65f, 0xfe}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000018c0)=[{0x3, 0x5, 0x1, 0xa}, {0x2, 0x4, 0x6}, {0x0, 0x3, 0xf, 0x8}, {0x1, 0x4, 0x2, 0x5}, {0x0, 0x3, 0x3, 0x2}, {0x1, 0x3, 0x9, 0xc}], 0x10, 0x80000000}, 0x90) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000003300)='ns/cgroup\x00') [ 1197.570267][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1197.575933][ T27] mutex_lock_nested+0x17/0x20 [ 1197.580925][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1197.602289][ T27] process_one_work+0x8a1/0x10c0 [ 1197.607309][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1197.621848][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1197.627451][ T27] ? kthread_data+0x4e/0xc0 [ 1197.641895][ T27] ? wq_worker_running+0x97/0x170 [ 1197.647013][ T27] worker_thread+0xaca/0x1280 [ 1197.651771][ T27] kthread+0x3f6/0x4f0 [ 1197.665982][ T27] ? rcu_lock_release+0x20/0x20 [ 1197.670860][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1197.691897][ T27] ret_from_fork+0x1f/0x30 [ 1197.696888][ T27] [ 1197.700029][ T27] INFO: task syz-executor.2:28424 blocked for more than 144 seconds. [ 1197.700368][T13591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1197.711889][ T27] Not tainted 5.15.151-syzkaller #0 [ 1197.732354][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1197.741155][ T27] task:syz-executor.2 state:D stack:27064 pid:28424 ppid: 1 flags:0x00004006 [ 1197.771882][ T27] Call Trace: [ 1197.775231][ T27] [ 1197.778184][ T27] __schedule+0x12c4/0x45b0 [ 1197.791873][ T27] ? __sched_text_start+0x8/0x8 [ 1197.796852][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1197.811843][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1197.817185][ T27] schedule+0x11b/0x1f0 [ 1197.833181][ T27] schedule_preempt_disabled+0xf/0x20 [ 1197.838618][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1197.851918][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1197.857219][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1197.871880][ T27] mutex_lock_nested+0x17/0x20 [ 1197.876709][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1197.881683][ T27] ? reacquire_held_locks+0x660/0x660 [ 1197.891952][ T27] ? rtnetlink_bind+0x80/0x80 [ 1197.896686][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1197.911866][ T27] ? __kernel_text_address+0x94/0x100 [ 1197.917323][ T27] ? unwind_get_return_address+0x49/0x80 [ 1197.932843][ T27] ? reacquire_held_locks+0x660/0x660 [ 1197.938270][ T27] ? arch_stack_walk+0xf3/0x140 [ 1197.961883][ T27] ? mark_lock+0x98/0x340 [ 1197.966423][ T27] ? mark_lock+0x98/0x340 [ 1197.970787][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1197.981934][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1197.986882][ T27] ? rtnetlink_bind+0x80/0x80 [ 1197.991585][ T27] ? netlink_ack+0xb10/0xb10 [ 1198.008145][ T27] netlink_unicast+0x7b6/0x980 [ 1198.021898][ T27] ? netlink_detachskb+0x90/0x90 [ 1198.027368][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1198.041922][ T27] ? 0xffffffff81000000 [ 1198.046127][ T27] ? __check_object_size+0x300/0x410 [ 1198.051541][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1198.091872][ T27] netlink_sendmsg+0xa30/0xd60 [ 1198.096832][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1198.102682][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1198.107755][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1198.141873][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1198.147592][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1198.171839][ T27] __sys_sendto+0x564/0x720 [ 1198.176577][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1198.201920][ T27] ? print_irqtrace_events+0x210/0x210 [ 1198.207651][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1198.221884][ T27] __x64_sys_sendto+0xda/0xf0 [ 1198.226657][ T27] do_syscall_64+0x3d/0xb0 [ 1198.231678][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1198.248046][ T27] RIP: 0033:0x7f2b61f3ba9c [ 1198.261966][ T27] RSP: 002b:00007ffc12dbb390 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1198.270572][ T27] RAX: ffffffffffffffda RBX: 00007f2b62b90620 RCX: 00007f2b61f3ba9c [ 1198.281876][ T27] RDX: 0000000000000028 RSI: 00007f2b62b90670 RDI: 0000000000000003 [ 1198.289987][ T27] RBP: 0000000000000000 R08: 00007ffc12dbb3e4 R09: 000000000000000c [ 1198.307621][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1198.316279][ T27] R13: 0000000000000000 R14: 00007f2b62b90670 R15: 0000000000000000 [ 1198.331597][ T27] [ 1198.336933][ T27] [ 1198.336933][ T27] Showing all locks held in the system: [ 1198.351917][ T27] 1 lock held by khungtaskd/27: [ 1198.356807][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1198.383109][ T27] 4 locks held by kworker/u4:3/525: [ 1198.388481][ T27] #0: ffff8880143c6938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.401845][ T27] #1: ffffc90002f57d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.431890][ T27] #2: ffff88807e8600e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 1198.442948][ T27] #3: ffff88807e862bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1198.461883][ T27] 2 locks held by getty/3262: [ 1198.466633][ T27] #0: ffff88802462b098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1198.493277][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1198.503975][ T27] 3 locks held by kworker/0:7/3561: [ 1198.509290][ T27] #0: ffff88814ac7dd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.531881][ T27] #1: ffffc90002fd7d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.551891][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1198.561475][ T27] 3 locks held by kworker/1:5/3577: [ 1198.567456][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.591884][ T27] #1: ffffc90003037d20 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.601761][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1198.621829][ T27] 5 locks held by kworker/u4:9/13591: [ 1198.627243][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.650369][ T27] #1: ffffc9000d60fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.671964][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1198.681423][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1198.701862][ T27] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1198.722680][ T27] 1 lock held by syz-executor.4/27226: [ 1198.728182][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1198.751914][ T27] 3 locks held by kworker/0:14/27510: [ 1198.757532][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.772640][ T27] #1: ffffc900043b7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.791848][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1198.801003][ T27] 3 locks held by kworker/0:16/27514: [ 1198.814871][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.841922][ T27] #1: ffffc900043c7d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.853228][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1198.871846][ T27] 3 locks held by kworker/0:20/27546: [ 1198.877266][ T27] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1198.901946][ T27] #1: ffffc90004367d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1198.912841][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1198.933094][ T27] 1 lock held by syz-executor.0/28089: [ 1198.938600][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1198.952565][ T27] 1 lock held by syz-executor.2/28424: [ 1198.958239][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1198.981946][ T27] 1 lock held by syz-executor.3/28670: [ 1198.987453][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1199.001594][ T27] 1 lock held by syz-executor.3/28828: [ 1199.011844][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.021415][ T27] 1 lock held by syz-executor.4/28830: [ 1199.043198][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.053701][ T27] 1 lock held by syz-executor.0/28862: [ 1199.059287][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.069454][ T27] 1 lock held by syz-executor.2/29060: [ 1199.081908][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.091387][ T27] 1 lock held by syz-executor.3/29415: [ 1199.099052][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.122003][ T27] 1 lock held by syz-executor.4/29417: [ 1199.127509][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.137446][ T27] 1 lock held by syz-executor.0/29440: [ 1199.143294][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.161557][ T27] 2 locks held by syz-executor.1/29479: [ 1199.170937][ T27] 3 locks held by syz-executor.1/29491: [ 1199.180430][ T27] 4 locks held by syz-executor.1/29494: [ 1199.189831][ T27] 3 locks held by syz-executor.1/29605: [ 1199.197034][ T27] 4 locks held by syz-executor.1/29609: [ 1199.205747][ T27] 1 lock held by syz-executor.2/29611: [ 1199.214678][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1199.227940][ T27] 2 locks held by syz-executor.1/29616: [ 1199.235587][ T27] 3 locks held by syz-executor.1/29617: [ 1199.241204][ T27] 2 locks held by syz-executor.1/29620: [ 1199.283158][ T27] 2 locks held by syz-executor.1/29775: [ 1199.288957][ T27] 2 locks held by syz-executor.1/29778: [ 1199.299553][ T27] 3 locks held by syz-executor.1/29977: [ 1199.314175][ T27] 2 locks held by syz-executor.1/29978: [ 1199.319759][ T27] 3 locks held by syz-executor.1/29982: [ 1199.346498][ T27] 3 locks held by syz-executor.1/29985: [ 1199.363365][ T27] 2 locks held by syz-executor.1/29987: [ 1199.368964][ T27] 2 locks held by syz-executor.1/29990: [ 1199.393011][ T27] 2 locks held by syz-executor.1/29995: [ 1199.398776][ T27] 2 locks held by syz-executor.1/29996: [ 1199.419862][ T27] 3 locks held by syz-executor.1/29999: [ 1199.427858][ T27] 2 locks held by syz-executor.1/30002: [ 1199.436073][ T27] 2 locks held by syz-executor.1/30004: [ 1199.441656][ T27] 3 locks held by syz-executor.1/30008: [ 1199.452192][ T27] 2 locks held by syz-executor.1/30011: [ 1199.462217][ T27] 2 locks held by syz-executor.1/30018: [ 1199.467803][ T27] 2 locks held by syz-executor.1/30021: [ 1199.484329][ T27] 2 locks held by syz-executor.1/30026: [ 1199.498055][ T27] [ 1199.500427][ T27] ============================================= [ 1199.500427][ T27] [ 1199.516345][ T27] NMI backtrace for cpu 1 [ 1199.520721][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1199.528715][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1199.538792][ T27] Call Trace: [ 1199.542092][ T27] [ 1199.545037][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1199.549748][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1199.555405][ T27] ? panic+0x84d/0x84d [ 1199.559593][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1199.564840][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1199.569802][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1199.574699][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1199.580870][ T27] ? _printk+0xd1/0x111 [ 1199.585043][ T27] ? panic+0x84d/0x84d [ 1199.589138][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1199.594055][ T27] ? panic+0x84d/0x84d [ 1199.598271][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1199.603332][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1199.609528][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1199.615549][ T27] watchdog+0xe72/0xeb0 [ 1199.619823][ T27] kthread+0x3f6/0x4f0 [ 1199.623902][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1199.628939][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1199.633545][ T27] ret_from_fork+0x1f/0x30 [ 1199.637994][ T27] [ 1199.641748][ T27] Sending NMI from CPU 1 to CPUs 0: [ 1199.647471][ C0] NMI backtrace for cpu 0 [ 1199.647483][ C0] CPU: 0 PID: 29778 Comm: syz-executor.1 Not tainted 5.15.151-syzkaller #0 [ 1199.647503][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1199.647513][ C0] RIP: 0010:stack_trace_consume_entry+0x12f/0x270 [ 1199.647538][ C0] Code: 89 f9 4c 89 ee 4c 89 f2 48 89 33 41 8b 19 41 0f b6 04 14 84 c0 0f 85 30 01 00 00 3b 5d 00 0f 92 c0 48 83 c4 18 5b 41 5c 41 5d <41> 5e 41 5f 5d c3 44 89 c9 80 e1 07 80 c1 03 38 c1 0f 8c ed fe ff [ 1199.647552][ C0] RSP: 0018:ffffc90003d96580 EFLAGS: 00000282 [ 1199.647568][ C0] RAX: 0000000000000001 RBX: ffffc90003d965a0 RCX: 0000000080000000 [ 1199.647581][ C0] RDX: dffffc0000000000 RSI: ffffffff81a938ff RDI: ffffc90003d9668c [ 1199.647595][ C0] RBP: ffffc90003d96688 R08: 0000000000000008 R09: ffffc90003d96690 [ 1199.647607][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88801c381dc0 [ 1199.647620][ C0] R13: ffffffff816dcf30 R14: 0000000000000009 R15: 1ffff920007b2cd2 [ 1199.647633][ C0] FS: 00007f6d7e8d66c0(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1199.647649][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1199.647661][ C0] CR2: 00007f6d80485988 CR3: 000000005d6a5000 CR4: 00000000003506f0 [ 1199.647677][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1199.647687][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1199.647698][ C0] Call Trace: [ 1199.647703][ C0] [ 1199.647709][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1199.647731][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1199.647750][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1199.647770][ C0] ? unknown_nmi_error+0xd0/0xd0 [ 1199.647795][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1199.647814][ C0] ? nmi_handle+0xf7/0x370 [ 1199.647831][ C0] ? stack_trace_consume_entry+0x12f/0x270 [ 1199.647849][ C0] ? default_do_nmi+0x62/0x150 [ 1199.647867][ C0] ? exc_nmi+0xab/0x120 [ 1199.647881][ C0] ? end_repeat_nmi+0x16/0x31 [ 1199.647900][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1199.647920][ C0] ? generic_perform_write+0x2bf/0x5b0 [ 1199.648026][ C0] ? stack_trace_consume_entry+0x12f/0x270 [ 1199.648044][ C0] ? stack_trace_consume_entry+0x12f/0x270 [ 1199.648063][ C0] ? stack_trace_consume_entry+0x12f/0x270 [ 1199.648081][ C0] [ 1199.648086][ C0] [ 1199.648092][ C0] arch_stack_walk+0x101/0x140 [ 1199.648113][ C0] ? generic_perform_write+0x2bf/0x5b0 [ 1199.648134][ C0] stack_trace_save+0x113/0x1c0 [ 1199.648151][ C0] ? stack_trace_snprint+0xe0/0xe0 [ 1199.648170][ C0] ? mark_lock+0x98/0x340 [ 1199.648188][ C0] __kasan_slab_alloc+0x8e/0xc0 [ 1199.648244][ C0] ? __kasan_slab_alloc+0x8e/0xc0 [ 1199.648262][ C0] ? slab_post_alloc_hook+0x53/0x380 [ 1199.648279][ C0] ? kmem_cache_alloc+0xf3/0x280 [ 1199.648295][ C0] ? alloc_buffer_head+0x20/0xf0 [ 1199.648341][ C0] ? alloc_page_buffers+0x3a3/0x660 [ 1199.648358][ C0] ? create_empty_buffers+0x3a/0x6d0 [ 1199.648375][ C0] ? ext4_block_write_begin+0x341/0x13a0 [ 1199.648409][ C0] ? ext4_da_write_begin+0x5c5/0xb60 [ 1199.648425][ C0] ? generic_perform_write+0x2bf/0x5b0 [ 1199.648464][ C0] slab_post_alloc_hook+0x53/0x380 [ 1199.648483][ C0] ? slab_pre_alloc_hook+0xa6/0xc0 [ 1199.648502][ C0] ? alloc_buffer_head+0x20/0xf0 [ 1199.648519][ C0] kmem_cache_alloc+0xf3/0x280 [ 1199.648538][ C0] alloc_buffer_head+0x20/0xf0 [ 1199.648556][ C0] alloc_page_buffers+0x3a3/0x660 [ 1199.648577][ C0] create_empty_buffers+0x3a/0x6d0 [ 1199.648599][ C0] ext4_block_write_begin+0x341/0x13a0 [ 1199.648621][ C0] ? ext4_da_release_space+0x560/0x560 [ 1199.648657][ C0] ? ext4_print_free_blocks+0x350/0x350 [ 1199.648674][ C0] ? seqcount_lockdep_reader_access+0x1d3/0x220 [ 1199.648692][ C0] ? wait_for_stable_page+0xe2/0x110 [ 1199.648710][ C0] ext4_da_write_begin+0x5c5/0xb60 [ 1199.648732][ C0] ? ext4_set_page_dirty+0x340/0x340 [ 1199.648748][ C0] ? current_time+0x1af/0x2f0 [ 1199.648779][ C0] ? atime_needs_update+0x7b0/0x7b0 [ 1199.648798][ C0] generic_perform_write+0x2bf/0x5b0 [ 1199.648822][ C0] ? grab_cache_page_write_begin+0x90/0x90 [ 1199.648843][ C0] ? ext4_write_checks+0x255/0x2c0 [ 1199.648862][ C0] ext4_buffered_write_iter+0x227/0x360 [ 1199.648884][ C0] ext4_file_write_iter+0x87c/0x1990 [ 1199.648900][ C0] ? _raw_spin_unlock+0x24/0x40 [ 1199.648917][ C0] ? follow_page_pte+0xad5/0xb60 [ 1199.648953][ C0] ? follow_page_mask+0xb59/0x13f0 [ 1199.648972][ C0] ? ext4_file_read_iter+0x6c0/0x6c0 [ 1199.648994][ C0] ? follow_page+0x130/0x130 [ 1199.649009][ C0] ? find_vma+0xd3/0x230 [ 1199.649039][ C0] ? check_vma_flags+0x407/0x490 [ 1199.649054][ C0] ? iov_iter_kvec+0x4a/0x170 [ 1199.649078][ C0] __kernel_write+0x5b1/0xa60 [ 1199.649100][ C0] ? vfs_read+0xe10/0xe10 [ 1199.649116][ C0] ? __lock_acquire+0x1ff0/0x1ff0 [ 1199.649137][ C0] ? down_read_killable+0x1d2/0x350 [ 1199.649156][ C0] __dump_emit+0x264/0x3a0 [ 1199.649208][ C0] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 1199.649227][ C0] ? dump_emit+0x152/0x3f0 [ 1199.649247][ C0] dump_user_range+0x91/0x320 [ 1199.649268][ C0] elf_core_dump+0x3c7d/0x4570 [ 1199.649285][ C0] ? reacquire_held_locks+0x660/0x660 [ 1199.649313][ C0] ? load_elf_library+0xa40/0xa40 [ 1199.649331][ C0] ? mark_lock+0x98/0x340 [ 1199.649348][ C0] ? __lock_acquire+0x1295/0x1ff0 [ 1199.649382][ C0] ? rcu_read_lock_any_held+0xb3/0x160 [ 1199.649404][ C0] ? kmem_cache_alloc+0x128/0x280 [ 1199.649426][ C0] do_coredump+0x1852/0x31e0 [ 1199.649442][ C0] ? ____kasan_slab_free+0xd8/0x120 [ 1199.649461][ C0] ? slab_free_freelist_hook+0xdd/0x160 [ 1199.649491][ C0] ? nfs_ssc_unregister+0x30/0x30 [ 1199.649524][ C0] ? get_signal+0x8ac/0x14e0 [ 1199.649558][ C0] ? do_raw_spin_unlock+0x137/0x8b0 [ 1199.649577][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1199.649594][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1199.649612][ C0] get_signal+0xc06/0x14e0 [ 1199.649635][ C0] arch_do_signal_or_restart+0xc3/0x1890 [ 1199.649664][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1199.649680][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1199.649699][ C0] ? _raw_spin_unlock+0x40/0x40 [ 1199.649719][ C0] ? get_sigframe_size+0x10/0x10 [ 1199.649737][ C0] ? force_sig_info_to_task+0x34a/0x470 [ 1199.649780][ C0] ? force_sig+0x114/0x1d0 [ 1199.649799][ C0] ? exit_to_user_mode_loop+0x39/0x130 [ 1199.649817][ C0] exit_to_user_mode_loop+0x97/0x130 [ 1199.649834][ C0] exit_to_user_mode_prepare+0xb1/0x140 [ 1199.649851][ C0] irqentry_exit_to_user_mode+0x5/0x40 [ 1199.649867][ C0] exc_general_protection+0x358/0x4f0 [ 1199.649888][ C0] ? vtime_user_enter+0x1eb/0x2d0 [ 1199.649908][ C0] ? __context_tracking_enter+0x5f/0x90 [ 1199.649933][ C0] asm_exc_general_protection+0x22/0x30 [ 1199.649951][ C0] RIP: 0033:0x7f6d80355db1 [ 1199.649965][ C0] Code: c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 1199.649979][ C0] RSP: 002b:0000000020000300 EFLAGS: 00010217 [ 1199.649997][ C0] RAX: 0000000000000000 RBX: 00007f6d80483f80 RCX: 00007f6d80355da9 [ 1199.650009][ C0] RDX: 0000000020000340 RSI: 0000000020000300 RDI: c97dc8308d900643 [ 1199.650020][ C0] RBP: 00007f6d803a247a R08: 0000000020000400 R09: 0000000020000400 [ 1199.650032][ C0] R10: 0000000020000380 R11: 0000000000000282 R12: 0000000000000000 [ 1199.650043][ C0] R13: 000000000000000b R14: 00007f6d80483f80 R15: 00007ffec7000508 [ 1199.650061][ C0] [ 1199.812833][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1199.812852][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1199.812875][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1199.812888][ T27] Call Trace: [ 1199.812896][ T27] [ 1199.812905][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1199.812939][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1199.812966][ T27] ? panic+0x84d/0x84d [ 1199.812998][ T27] panic+0x318/0x84d [ 1199.813020][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1199.813048][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1199.813078][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1199.813102][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1199.813130][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1199.813155][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1199.813183][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1199.813213][ T27] watchdog+0xeb0/0xeb0 [ 1199.813246][ T27] kthread+0x3f6/0x4f0 [ 1199.813267][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1199.813289][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1199.813312][ T27] ret_from_fork+0x1f/0x30 [ 1199.813348][ T27] [ 1199.813604][ T27] Kernel Offset: disabled [ 1200.514851][ T27] Rebooting in 86400 seconds..