MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:34 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x0, &(0x7f0000000800)="684cf62a10b30c7583adece922935bc9ad32c87a9b078f2db38bcc1271409cd9bbb2d8d8e9ad159cceda041938349e", 0x2f, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)="70aa568901c3292351564e8cbf6bf028147d8d42e62224fe413e26ba5d5fe22fa3b6238c6b05fb32189bc7502ea0d497f1e32e8c2bfc272ed164cb470f9ac3d542f11b6e4611cec01e7f3c8dfde2c6273c15d687acc51fa4f7d23212e969fe034e56f97d5700aa9d303a12167113ba5652b0e062e246eb2b87ae9103ecf6e1e57810f259d9230b874277ca838a3a75e72c82b5f07f56579119a2058fc71d36bf7082d410841dba638104c09e9e2d7de14638bf50e6623acc73dfb6e6cc43") 15:23:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:23:34 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r12 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r13, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:34 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000020c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r6, 0x6, '\x00', r16, r7, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002140)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x8, '\x00', r14, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000021c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x7, [@var={0xf, 0x0, 0x0, 0xe, 0x5, 0x1}, @fwd={0xf}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x24, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8, 0x1}, {0x6, 0x1}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x5}, @fwd={0xa}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x61, 0x30, 0x0, 0x30, 0x61]}}, &(0x7f0000002280)=""/174, 0x8f, 0xae, 0x0, 0x4}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:34 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:35 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:23:35 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:35 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:35 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000020c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r6, 0x6, '\x00', r16, r7, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002140)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x8, '\x00', r14, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000021c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x7, [@var={0xf, 0x0, 0x0, 0xe, 0x5, 0x1}, @fwd={0xf}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x24, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8, 0x1}, {0x6, 0x1}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x5}, @fwd={0xa}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x61, 0x30, 0x0, 0x30, 0x61]}}, &(0x7f0000002280)=""/174, 0x8f, 0xae, 0x0, 0x4}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:35 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)="70aa568901c3292351564e8cbf6bf028147d8d42e62224fe413e26ba5d5fe22fa3b6238c6b05fb32189bc7502ea0d497f1e32e8c2bfc272ed164cb470f9ac3d542f11b6e4611cec01e7f3c8dfde2c6273c15d687acc51fa4f7d23212e969fe034e56f97d5700aa9d303a12167113ba5652b0e062e246eb2b87ae9103ecf6e1e57810f259d9230b874277ca838a3a75e72c82b5f07f56579119a2058fc71d36bf7082d410841dba638104c09e9e2d7de14638bf50e6623acc73dfb6e6cc43") 15:23:35 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:35 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:23:35 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r6}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r6}, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:35 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000020c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r6, 0x6, '\x00', r16, r7, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002140)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x8, '\x00', r14, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f00000021c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x7, [@var={0xf, 0x0, 0x0, 0xe, 0x5, 0x1}, @fwd={0xf}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x24, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8, 0x1}, {0x6, 0x1}]}, @ptr={0x10, 0x0, 0x0, 0x2, 0x5}, @fwd={0xa}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x61, 0x30, 0x0, 0x30, 0x61]}}, &(0x7f0000002280)=""/174, 0x8f, 0xae, 0x0, 0x4}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:36 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:36 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)="70aa568901c3292351564e8cbf6bf028147d8d42e62224fe413e26ba5d5fe22fa3b6238c6b05fb32189bc7502ea0d497f1e32e8c2bfc272ed164cb470f9ac3d542f11b6e4611cec01e7f3c8dfde2c6273c15d687acc51fa4f7d23212e969fe034e56f97d5700aa9d303a12167113ba5652b0e062e246eb2b87ae9103ecf6e1e57810f259d9230b874277ca838a3a75e72c82b5f07f56579119a2058fc71d36bf7082d410841dba638104c09e9e2d7de14638bf50e6623acc73dfb6e6cc43") 15:23:36 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, &(0x7f0000001480)='syzkaller\x00', 0x7fff, 0x6a, &(0x7f00000014c0)=""/106, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:36 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000020c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r6, 0x6, '\x00', r16, r7, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002140)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x8, '\x00', r14, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:36 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r6}, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:36 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:37 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x7fff, 0x6a, &(0x7f00000014c0)=""/106, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:37 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0)="70aa568901c3292351564e8cbf6bf028147d8d42e62224fe413e26ba5d5fe22fa3b6238c6b05fb32189bc7502ea0d497f1e32e8c2bfc272ed164cb470f9ac3d542f11b6e4611cec01e7f3c8dfde2c6273c15d687acc51fa4f7d23212e969fe034e56f97d5700aa9d303a12167113ba5652b0e062e246eb2b87ae9103ecf6e1e57810f259d9230b874277ca838a3a75e72c82b5f07f56579119a2058fc71d36bf7082d410841dba638104c09e9e2d7de14638bf50e6623acc73dfb6e6cc43") 15:23:37 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:37 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:37 executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:37 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000020c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r6, 0x6, '\x00', r16, r7, 0x1, 0x4, 0x4}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x6a, &(0x7f00000014c0)=""/106, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:38 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:38 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)="70aa568901c3292351564e8cbf6bf028147d8d42e62224fe413e26ba5d5fe22fa3b6238c6b05fb32189bc7502ea0d497f1e32e8c2bfc272ed164cb470f9ac3d542f11b6e4611cec01e7f3c8dfde2c6273c15d687acc51fa4f7d23212e969fe034e56f97d5700aa9d303a12167113ba5652b0e062e246eb2b87ae9103ecf6e1e57810f259d9230b874277ca838a3a75e72c82b5f07f56579119a2058fc71d36bf7082d410841dba638104c09e9e2d7de14638bf50e6623acc73dfb6e6cc43") 15:23:38 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:38 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) 15:23:38 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r13 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r14, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r12, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r11, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000001e00)=[0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc2, &(0x7f0000001e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0x38, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r13, 0xffffffffffffffff, 0x0, r15}, 0x10) 15:23:38 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:38 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 15:23:38 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r12 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r13, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) ioctl$TUNGETFEATURES(r11, 0x800454cf, &(0x7f0000001d80)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r12, 0xffffffffffffffff, 0x0, r14}, 0x10) 15:23:39 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2}, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:39 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, 0x0, 0x0) 15:23:39 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:39 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:39 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 15:23:39 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r12 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r13, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r12, 0xffffffffffffffff, 0x0, r14}, 0x10) 15:23:39 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, 0x0, 0x0) 15:23:39 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:39 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:40 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:40 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r12 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x3f, &(0x7f0000001500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0x94}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0xa0, &(0x7f0000001740)=""/160, 0x41100, 0x22, '\x00', r13, 0x25, r5, 0x8, &(0x7f0000001b40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001b80)={0x2, 0x3, 0xa022, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001bc0)=[r6, r10], &(0x7f0000001c00)=[{0x1, 0x3, 0x7, 0x7}, {0x4, 0x3, 0x0, 0x6}, {0x0, 0x3, 0x0, 0x3}, {0x0, 0x4, 0xc, 0x5}, {0x5, 0x1, 0x6, 0x1}], 0x10, 0xff}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r12, 0xffffffffffffffff, 0x0, r14}, 0x10) 15:23:40 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 15:23:40 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, 0x0, 0x0) 15:23:40 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:40 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:40 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0x5, 0x7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:40 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair(0x1e, 0x3, 0x7, &(0x7f00000007c0)) syz_clone(0x10100400, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)) 15:23:41 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 15:23:41 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r5, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r6, r1, r3, r5], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r7}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r7, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r7, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r7, r0, r9, r10, r1, r6, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r7}, 0x8) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r7}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000001900)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001940), &(0x7f0000001980), 0x8, 0xa9, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r11}, 0x10) 15:23:41 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 15:23:41 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r6}, 0x8) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000014c0)={r6}, 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640)={r10}, 0x10) 15:23:41 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:41 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff}, 0xc) 15:23:41 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:42 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:42 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:42 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x0, 0x0, 0x0}, 0x90) 15:23:42 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000001480)={r6}, 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:42 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:42 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:42 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:42 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:42 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:43 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000013c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x3, 0x5, 0xa, 0x0, 0x100, 0x10}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x2, 0xb, 0xfffffffffffffff4}, @generic={0x8, 0x2, 0x3, 0x6, 0x467}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000010c0)='GPL\x00', 0x5, 0xf2, &(0x7f0000001100)=""/242, 0x41000, 0x4, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001240)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x0, 0x9, 0x60d, 0x1}, 0x10, 0x29c09, 0xffffffffffffffff, 0x4, &(0x7f0000001340)=[r6, r0, r8, r9, r1, r5, r0], &(0x7f0000001380)=[{0x3, 0x5, 0x6, 0xa}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x2, 0x5, 0x6}, {0x0, 0x1, 0x1, 0xc}], 0x10, 0xa8}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:43 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:43 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:43 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:43 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:43 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x9, 0x8}, 0xc) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:43 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:44 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:44 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:44 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:44 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:44 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={r2}, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:44 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:45 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:45 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:45 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=0xffffffffffffffff, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:45 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:46 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:46 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:46 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r7, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r8, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r9, 0x10, 0x10, 0x0, @prog_fd=r3, r10}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r7, 0x3f, 0x8}, 0xc) r11 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r11}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:46 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:46 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:46 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:47 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:47 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r7, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r8, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r9, 0x10, 0x10, 0x0, @prog_fd=r3, r10}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r7, 0x3f, 0x8}, 0xc) r11 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r11}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:47 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:47 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:47 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f0000001000)={&(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000ec0)=""/87, 0x57}, {&(0x7f0000000f40)}], 0x2, &(0x7f0000000fc0)=""/7, 0x7}, 0x40000040) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:47 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:48 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r7, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r8, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r9, 0x10, 0x10, 0x0, @prog_fd=r3, r10}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r7, 0x3f, 0x8}, 0xc) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:48 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:48 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:48 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x5, '\x00', 0x0, r6, 0x0, 0x3, 0x1}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:48 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:48 executing program 0: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:48 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 15:23:49 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r7, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r8, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r9, 0x10, 0x10, 0x0, @prog_fd=r3, r10}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r7, 0x3f, 0x8}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:49 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:49 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)=@o_path={&(0x7f0000000d00)='./file0\x00', r3, 0x4000, r6}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:49 executing program 2: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:49 executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r7, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r8, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r9, 0x10, 0x10, 0x0, @prog_fd=r3, r10}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) 15:23:50 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000d40), 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:50 executing program 4: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:50 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:50 executing program 3: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:50 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r4, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r6, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r7, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r8, 0x10, 0x10, 0x0, @prog_fd=r3, r9}, 0x20) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000980)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:51 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x16, &(0x7f0000000980)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x3f, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x9, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x5, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[r0, r2, r1, r3, r5, r1, r3, r4], &(0x7f0000000c00), 0x10, 0x1}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:51 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40)={0x80000000}, 0x8) 15:23:51 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:51 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r4, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r5, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r6, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r7, 0x10, 0x10, 0x0, @prog_fd=r3, r8}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:51 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x401, '\x00', 0x0, r4, 0x0, 0x2, 0x3}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:52 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 15:23:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r4, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r5, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:52 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 15:23:52 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1a, &(0x7f0000000500)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x80000000}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='GPL\x00', 0xffff, 0x91, &(0x7f0000000640)=""/145, 0x40f00, 0x19, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000007c0)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0xfffffff8, 0x5}, {0x5, 0x2, 0xe}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xd, 0x8}, {0x5, 0x2, 0x7, 0xc}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x1, 0x4}, {0x1, 0x5, 0x3, 0x4}, {0x5, 0x4, 0x10, 0x1}, {0x0, 0x5, 0xc, 0xb}], 0x10, 0x8001}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:52 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:52 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 15:23:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r4, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:53 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 15:23:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:53 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) 15:23:53 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x10, 0x0, 0x0, 0xe, 0x3, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, &(0x7f0000000740)=""/60, 0x2d, 0x3c, 0x0, 0x298f}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:53 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 15:23:53 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 365.082197][ T7704] Bluetooth: hci0: command 0x0406 tx timeout [ 365.088304][ T7704] Bluetooth: hci2: command 0x0406 tx timeout [ 365.094941][ T13] Bluetooth: hci1: command 0x0406 tx timeout [ 365.140439][ T7704] Bluetooth: hci4: command 0x0406 tx timeout 15:23:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r4, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:54 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000080)=@raw=[@printk={@s}, @exit, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000140), 0x1e00, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x1, r1, r2, r3], &(0x7f0000000400)=[{0x2, 0x1, 0xa, 0xb}, {0x4, 0x3, 0xe, 0x6}, {0x4, 0x1, 0x10, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:54 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:54 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:54 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40), 0x8) 15:23:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:54 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r4, 0x3, 0x18}, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:55 executing program 2: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, &(0x7f0000000300), &(0x7f0000000340)='%pi6 \x00'}, 0x20) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:55 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40), 0x8) 15:23:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 15:23:55 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:55 executing program 0: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:55 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:23:56 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001d40), 0x8) 15:23:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:56 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:56 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:56 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:23:56 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:57 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:23:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:57 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:57 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:23:57 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:57 executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002640), 0x10) 15:23:57 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:23:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:23:58 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 15:23:58 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:23:59 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:23:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 370.881414][ T9595] chnl_net:caif_netlink_parms(): no params data found 15:23:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:23:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:24:00 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:00 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:24:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:00 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 372.442397][ T3562] Bluetooth: hci3: command 0x0409 tx timeout 15:24:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:24:01 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:01 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 373.265409][ T9595] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.291357][ T9595] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.317967][ T9595] device bridge_slave_0 entered promiscuous mode 15:24:02 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 373.368143][ T9595] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.406849][ T9595] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.451351][ T9595] device bridge_slave_1 entered promiscuous mode 15:24:02 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:24:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 15:24:03 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:24:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 374.522093][ T3567] Bluetooth: hci3: command 0x041b tx timeout 15:24:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:03 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 375.203464][ T9595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 375.422707][ T9595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:24:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 376.602031][ T13] Bluetooth: hci3: command 0x040f tx timeout 15:24:05 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:05 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:24:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:05 executing program 4: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:06 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) 15:24:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:06 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:06 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 15:24:06 executing program 1: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:06 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r3, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) [ 378.369709][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.376090][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 15:24:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 378.559451][ T9595] team0: Port device team_slave_0 added [ 378.588281][ T9595] team0: Port device team_slave_1 added 15:24:07 executing program 4: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 378.682081][ T3567] Bluetooth: hci3: command 0x0419 tx timeout 15:24:07 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 15:24:07 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:07 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) 15:24:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:08 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 15:24:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 380.294359][ T9595] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 380.311963][ T9595] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:24:09 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 380.430165][ T9595] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 380.542832][ T9595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 380.549951][ T9595] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.661955][ T9595] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:24:09 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 15:24:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:10 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 15:24:10 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:11 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 382.473327][ T3557] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:24:11 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 382.807789][ T3557] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 382.960649][ T9595] device hsr_slave_0 entered promiscuous mode 15:24:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) [ 383.087311][ T9595] device hsr_slave_1 entered promiscuous mode [ 383.799478][ T9595] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 383.829813][ T9595] Cannot create hsr debugfs directory 15:24:12 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) 15:24:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:14 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 385.949772][ T3557] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:24:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:15 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:24:16 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 388.171848][ T3557] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:24:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:18 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:20 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 395.802124][ T13] Bluetooth: hci5: command 0x0406 tx timeout [ 405.774615][ T9595] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 406.054344][ T9595] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 406.195070][ T9595] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 406.811383][ T9595] netdevsim netdevsim0 netdevsim3: renamed from eth3 15:24:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:36 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:36 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 408.152138][ T9595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.212750][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 408.220652][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.278052][ T9595] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.304714][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 408.324399][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:24:37 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400}, 0x8) [ 408.357016][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.364180][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.403248][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 408.442808][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:24:37 executing program 1: recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) [ 408.451559][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.558265][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.565543][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state 15:24:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 408.638472][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 408.676534][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 408.765114][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 408.784021][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 408.802779][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 408.821829][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 408.850831][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 408.882703][ T3592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.896721][ T9595] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 408.928603][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 408.961461][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 408.972939][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 408.981378][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:24:37 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:37 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:38 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 410.808718][ T9947] chnl_net:caif_netlink_parms(): no params data found [ 410.951324][ T9595] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 410.975527][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 410.986350][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:24:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 411.512298][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 411.521154][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 411.601404][ T9595] device veth0_vlan entered promiscuous mode 15:24:40 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 411.802415][ T2978] Bluetooth: hci1: command 0x0409 tx timeout 15:24:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x12040) 15:24:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:41 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 413.042833][ T7703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 413.051417][ T7703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 15:24:41 executing program 4: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 413.486853][ T9947] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.507025][ T9947] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.543179][ T9947] device bridge_slave_0 entered promiscuous mode [ 413.552013][ T9595] device veth1_vlan entered promiscuous mode [ 413.573011][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.580944][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.660635][ T9947] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.686494][ T9947] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.743487][ T9947] device bridge_slave_1 entered promiscuous mode [ 413.882061][ T3623] Bluetooth: hci1: command 0x041b tx timeout 15:24:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:42 executing program 1: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:43 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) [ 414.960028][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.992716][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 15:24:44 executing program 1: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) [ 415.934577][ T9947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 415.963173][ T3562] Bluetooth: hci1: command 0x040f tx timeout [ 415.994566][ T9595] device veth0_macvtap entered promiscuous mode [ 416.003713][ T7098] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 416.036176][ T9947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 416.054378][ T9595] device veth1_macvtap entered promiscuous mode 15:24:44 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) 15:24:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:24:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:46 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) [ 417.621249][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.649733][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.661196][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.711505][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.736930][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.811489][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.860339][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.883741][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.953222][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.991987][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:24:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 418.007858][ T9595] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 418.042093][ T3562] Bluetooth: hci1: command 0x0419 tx timeout 15:24:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) 15:24:47 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 419.381865][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 419.391840][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 419.441599][ T9947] team0: Port device team_slave_0 added [ 419.461789][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 419.503090][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 419.539767][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:24:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.568266][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 419.602387][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 419.664064][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 419.693417][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 419.741945][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 419.763495][ T9595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 419.803439][ T9595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 419.833502][ T9595] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 419.872216][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 419.887577][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 419.908177][ T9947] team0: Port device team_slave_1 added 15:24:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) [ 419.932695][ T9595] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.941422][ T9595] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.992043][ T9595] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 420.000789][ T9595] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 15:24:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:49 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:50 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 422.151076][ T9947] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.158499][ T9947] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.266864][ T9947] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:24:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:24:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:51 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) [ 422.817187][ T9947] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.834533][ T9947] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.941977][ T9947] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:24:52 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:52 executing program 1: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:53 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:53 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:54 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) 15:24:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:24:56 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:24:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) openat$cgroup_procs(r5, &(0x7f0000000680)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r9, 0x3, 0x18}, 0xc) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000740)={'nr0\x00', 0x200}) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r10, 0x7, 0x0, 0x400, &(0x7f0000000800)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000940)={@map=r3, r11, 0x10, 0x10, 0x0, @prog_fd=r3, r12}, 0x20) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000980)=0x40) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000009c0)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={r9, 0x3f, 0x8}, 0xc) r13 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000a40), 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r13}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x308a, '\x00', 0x0, r14, 0x5, 0x1, 0x1}, 0x48) openat$cgroup_netprio_ifpriomap(r14, &(0x7f0000000b80), 0x2, 0x0) openat$cgroup_type(r8, &(0x7f0000000bc0), 0x2, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000e40)={&(0x7f0000000c00)="88924dd62664a2f5df746a2a532bf73d11d05e2bbcb419a2115492e8fd836aaaea41460a9fb154ecdb85771d8c457cef7cfcfaca68fb09065e452cfdd347c51c18fed5413852debddb32de006779d2e60b2df340b2b154facb2df9818d042f08ed1009806bb9c2d3b91f6fbcf83283d2e5d1d18a76c0", &(0x7f0000000c80)=""/247, &(0x7f0000000d80)="7f8f0627f0b278618a5070568e8879d38f95c927e96a3fc6015422c8542c4243beb493be1702b1d1b3517516c8dc2ed825f4ada4b39491f2208d41e6ff0c32", &(0x7f0000000dc0)="7529385af06f9d723535db4df0cc042df21a25188b661f957dc187fe508d829269c0b1138c4fea8c2c601a8fae4223b402a4c8caa5197b3e4029922f901798ca5bd8ffbd7f7e31157fb1fcebfd5e4f179be7dde5d30beedee99811b4f695d9fcbf4ba7d490fbcb25c902290e9f053bbcbdaf159ed57d30541f176a53", 0x8000, r7}, 0x38) openat$cgroup_freezer_state(r7, &(0x7f0000000e80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r6, 0x58, &(0x7f0000000ec0)}, 0x10) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000fc0)) [ 428.347058][ T9947] device hsr_slave_0 entered promiscuous mode 15:24:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 428.677515][ T9947] device hsr_slave_1 entered promiscuous mode [ 428.686509][ T9947] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 428.701520][ T9947] Cannot create hsr debugfs directory 15:24:57 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 429.432228][ T4283] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 429.440323][ T4283] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:24:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) 15:24:58 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r3 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r4 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r3, r4, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r6, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r9 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r4, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r3, 0xc, r9, 0x3) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r8, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r10, 0x4000, r1}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r7, 0x1d, 0x2028, r7, @prog_fd=r7, r2}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r5}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r8, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r12, 0x25, r6, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r1, r10, r13, r10, r1, r0, r10], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r12, 0x0, r6, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r13, r10, r10, r13, r0, r13], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r14, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r11, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r9}, 0x18) 15:24:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 430.669726][ T7703] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 430.922106][ T1066] Bluetooth: hci4: command 0x0409 tx timeout 15:24:59 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r3 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r4 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r3, r4, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r6, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r9 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r4, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r3, 0xc, r9, 0x3) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r8, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r10, 0x4000, r1}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r7, 0x1d, 0x2028, r7, @prog_fd=r7, r2}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r5}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r8, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r12, 0x25, r6, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r1, r10, r13, r10, r1, r0, r10], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r12, 0x0, r6, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r13, r10, r10, r13, r0, r13], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r14, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r11, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r9}, 0x18) 15:25:00 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6c, 0x1, 0x0, 0x5, 0x0, 0x100000001, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xf9, 0x7f, 0x4, 0x81, 0x0, 0x1b35d61a, 0x30, 0x336a7ea1ca9fe4ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1d, 0x2, @perf_config_ext={0x80000001, 0x8000000000000001}, 0x100014, 0x80000001, 0x1, 0x1, 0xec1, 0xae1, 0x2, 0x0, 0x1f, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x4, 0x80, 0x81, 0x5, 0x1, 0x7, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x8824, 0x8, 0x7, 0x0, 0x200, 0x7ef7, 0x3, 0x0, 0x0, 0x0, 0x6}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/163) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/123, 0x7b}], 0x3, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x3, 0x18}, 0xc) 15:25:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:25:01 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r3 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r4 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r3, r4, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r6, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r9 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r4, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r3, 0xc, r9, 0x3) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r8, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r10, 0x4000, r1}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r7, 0x1d, 0x2028, r7, @prog_fd=r7, r2}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r5}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r8, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r12, 0x25, r6, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r1, r10, r13, r10, r1, r0, r10], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r12, 0x0, r6, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r13, r10, r10, r13, r0, r13], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r14, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r11, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r9}, 0x18) 15:25:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340), 0x6e, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/20, 0x14}, {0x0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x12040) [ 433.002050][ T3623] Bluetooth: hci4: command 0x041b tx timeout [ 433.181026][ T3557] device hsr_slave_0 left promiscuous mode 15:25:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf6f, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:25:02 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 434.025103][ T3557] device hsr_slave_1 left promiscuous mode 15:25:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) 15:25:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa25c}, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 435.082088][ T13] Bluetooth: hci4: command 0x040f tx timeout [ 435.233058][ T3557] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 435.240656][ T3557] batman_adv: batadv0: Removing interface: batadv_slave_0 15:25:04 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:25:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 435.766571][ T3557] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 435.802014][ T3557] batman_adv: batadv0: Removing interface: batadv_slave_1 15:25:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 436.362328][ T3557] device bridge_slave_1 left promiscuous mode [ 436.368661][ T3557] bridge0: port 2(bridge_slave_1) entered disabled state 15:25:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 437.162044][ T3562] Bluetooth: hci4: command 0x0419 tx timeout [ 437.272713][ T3557] device bridge_slave_0 left promiscuous mode [ 437.279111][ T3557] bridge0: port 1(bridge_slave_0) entered disabled state 15:25:06 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map, 0xffffffffffffffff, 0x14, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) 15:25:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x3f, 0x0, 0x10001, 0x6, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 437.852119][ T3557] device veth1_macvtap left promiscuous mode [ 437.858203][ T3557] device veth0_macvtap left promiscuous mode [ 437.869169][ T3557] device veth1_vlan left promiscuous mode 15:25:06 executing program 3: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 437.932039][ T3557] device veth0_vlan left promiscuous mode [ 438.682029][ T3623] Bluetooth: hci3: command 0x0409 tx timeout [ 439.805334][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.811689][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.762002][ T3562] Bluetooth: hci3: command 0x041b tx timeout [ 442.842118][ T2978] Bluetooth: hci3: command 0x040f tx timeout [ 444.941999][ T3623] Bluetooth: hci3: command 0x0419 tx timeout [ 454.990487][ T3557] team0 (unregistering): Port device team_slave_1 removed [ 455.733432][ T3557] team0 (unregistering): Port device team_slave_0 removed [ 456.321325][ T3557] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 457.274554][ T3557] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 459.772815][ T3557] bond0 (unregistering): Released all slaves 15:25:31 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=0xffffffffffffffff, 0x1d, 0x0, 0xa5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r0, 0xffffffffffffffff, 0x0, 0x2014, 0x0, @link_fd=r1, r3}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x1}, 0x8) r4 = syz_clone(0x20000, &(0x7f0000000300)="7d9e43dff32214abc46a8f3d12a477a97058bdac79035405c391743f63aecf0e1acd50c70444c7c218b68d6db701b83f10a11cc5cfd3d1bef88a50b2c4dcbacdad9b9aa2c7af08eef969ef8006bd111092", 0x51, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="03374b3554e3c5754fb4be16d5574b9b1a70de023c43d1d4db94df9fea94f81c208f5f07aeeef53653d60ef5a748e1c1616dfbe6dca764bd4d29980c814da768fc609efddfcef627403855fadee5d87dc54520651aa6edb7b1837f79907517bcbd3affdf85797af5356b0163fb80e8f16972c64eedf3953bfdde3c9761e17a416dd031ac11c78de70e3d7240795a37bb245867414a995efe486e27050114c32c9e244ab69f4a7a56aa408220cd59bb3518d035aba0c0") r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x1, 0xf8, 0x8, 0x0, 0x5, 0xb121, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x3}, 0x8020, 0x1c9, 0x5460, 0x7, 0x8, 0xfb4, 0x0, 0x0, 0x20, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r5, 0x0, 0xd, &(0x7f0000000540)='!d).@+$+-+/(\x00', 0x0}, 0x30) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x8, 0xe2, &(0x7f00000006c0)=""/226, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000000800)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r0, r0], &(0x7f0000000880)=[{0x5, 0x4, 0x7, 0x1}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0xf, 0x7}], 0x10, 0x100}, 0x90) recvmsg(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000980)=@nfc, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000a40)=""/253, 0xfd}, {&(0x7f0000000b40)=""/72, 0x48}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/219, 0xdb}], 0x6, &(0x7f0000000e40)=""/77, 0x4d}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r0, 0x58, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f00000010c0)={0x0, 0x80, 0x6, 0xc0, 0x0, 0x5, 0x0, 0x7fffffffffffffff, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x9, 0x7fffffffffffffff}, 0x4, 0x9, 0x7f, 0x5, 0x6, 0x6, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x8, r5, 0x3) perf_event_open(&(0x7f0000001040)={0x0, 0x80, 0x2, 0x0, 0x5, 0x4, 0x0, 0xec9, 0x4, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001000), 0x1}, 0xa, 0x7fffffffffffffff, 0x1, 0x2, 0x8000, 0x5, 0x2, 0x0, 0x4, 0x0, 0x10000}, r4, 0xc, r10, 0x3) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={r9, 0x82, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r11, 0x4000, r2}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={@map=r0, r8, 0x1d, 0x2028, r8, @prog_fd=r8, r3}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001240)={r6}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000014c0)={&(0x7f00000012c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001340)="8eb62a26d5d3038b02cc7155a4e918d698e86a48ce905d7d2de08dfdfaa9f9b9820d53bfb81b7af786ed05a451c7082c5b7fdc667e336e251a439c97c8d1b38d2128ee47cf405fcb26aacda6a74a4770c89b06f535b8e2841240f94133d8592ffc92a9d8c11fb77513e3bc0dc782bfb7cbf40a7d0bd8e2746f769184d14d43db8efbd318dce86e87a63c8d3ac1f79cdc3fc45f61e099f8cf7430f7ccf9032292a7", 0xa1}, {&(0x7f0000001400)='g', 0x1}, {&(0x7f0000001440)="19dd70dc868eb5f28b3a0cee6bdfb5b42e536322f81fbba9fdac0f045421", 0x1e}], 0x3, 0x0, 0x0, 0x40080}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x58, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001900)={r9, 0x7, 0x18}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x2b, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000000}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x9, 0x2, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xbc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000001680)='GPL\x00', 0x1, 0xea, &(0x7f00000016c0)=""/234, 0x41000, 0x5, '\x00', r13, 0x25, r7, 0x8, &(0x7f0000001880)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x2, 0x1, 0xfffffffd, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001940)=[r2, r11, r14, r11, r2, r0, r11], &(0x7f0000001980)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x14, &(0x7f0000001a80)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @generic={0x59, 0xe, 0xe, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe6f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001b40)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x3, '\x00', r13, 0x0, r7, 0x8, &(0x7f0000001b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001bc0)={0x4, 0x1, 0x8000, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[r14, r11, r11, r14, r0, r14], &(0x7f0000001c40)=[{0x3, 0x5, 0xe, 0x8}, {0x1, 0x5, 0x5, 0x9}], 0x10, 0xa15}, 0x90) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1d, &(0x7f0000001d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @jmp={0x5, 0x1, 0x7, 0xb, 0x4, 0x10, 0xfffffffffffffff0}, @generic={0xfa, 0x8, 0x1, 0x8, 0x7ff}, @exit, @alu={0x4, 0x0, 0x8, 0x0, 0x6, 0x80, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000001e40)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ec0)={0x1, 0x0, 0x786e, 0xfff}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001f00)=[r0], &(0x7f0000001f40)=[{0x3, 0x5, 0x4, 0x6}, {0x1, 0x1, 0xc, 0x2}, {0x4, 0x3, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x3}, {0x0, 0x2, 0x2, 0xa}, {0x3, 0x3, 0x2, 0xa}, {0x1, 0x2, 0x0, 0x6}, {0x3, 0x4, 0x4, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x5}, 0x90) recvmsg$unix(r12, &(0x7f0000003540)={&(0x7f00000020c0)=@abs, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/239, 0xef}, {&(0x7f0000003240)=""/93, 0x5d}, {&(0x7f00000032c0)=""/222, 0xde}, {&(0x7f00000033c0)=""/37, 0x25}, {&(0x7f0000003400)=""/17, 0x11}, {&(0x7f0000003440)=""/116, 0x74}], 0x7}, 0x101) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003900)=@o_path={&(0x7f0000003580)='./file1\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) [ 466.710954][ T9947] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 466.862113][T10179] chnl_net:caif_netlink_parms(): no params data found [ 466.958256][T10126] chnl_net:caif_netlink_parms(): no params data found [ 467.002070][ T3567] Bluetooth: hci5: command 0x0409 tx timeout 15:25:36 executing program 1: perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xa) [ 469.082161][ T7707] Bluetooth: hci5: command 0x041b tx timeout [ 469.744256][T10179] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.751533][T10179] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.812823][T10179] device bridge_slave_0 entered promiscuous mode [ 470.743145][ T9947] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.969039][T10179] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.980250][T10179] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.020045][T10179] device bridge_slave_1 entered promiscuous mode [ 471.162231][ T7703] Bluetooth: hci5: command 0x040f tx timeout [ 471.652299][ T7707] Bluetooth: hci6: command 0x0409 tx timeout [ 472.869473][ T9947] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 473.241999][ T1066] Bluetooth: hci5: command 0x0419 tx timeout [ 473.657649][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.666646][T10126] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.711383][T10126] device bridge_slave_0 entered promiscuous mode [ 473.721479][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.729656][ T2978] Bluetooth: hci6: command 0x041b tx timeout [ 473.758252][T10126] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.773341][T10126] device bridge_slave_1 entered promiscuous mode [ 474.646782][ T9947] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.763231][T10179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 475.802174][ T1066] Bluetooth: hci6: command 0x040f tx timeout [ 476.055168][T10126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 476.461022][T10190] chnl_net:caif_netlink_parms(): no params data found [ 476.480697][T10179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 476.774007][T10126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 477.882223][ T3562] Bluetooth: hci6: command 0x0419 tx timeout [ 477.972209][ T7704] Bluetooth: hci7: command 0x0409 tx timeout [ 478.613614][T10179] team0: Port device team_slave_0 added [ 479.230672][T10126] team0: Port device team_slave_0 added [ 479.245698][T10126] team0: Port device team_slave_1 added [ 479.894128][T10179] team0: Port device team_slave_1 added [ 480.042293][ T3623] Bluetooth: hci7: command 0x041b tx timeout [ 480.229668][T10126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 480.255072][T10126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 480.352586][T10126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 481.245627][T10126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 481.252723][T10126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 481.471930][T10126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 481.528587][T10179] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 481.541933][T10179] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 481.651941][T10179] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 482.122372][ T2978] Bluetooth: hci7: command 0x040f tx timeout [ 482.530968][T10179] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 482.553505][T10179] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 482.655831][T10179] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 482.696108][T10190] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.712311][T10190] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.720683][T10190] device bridge_slave_0 entered promiscuous mode [ 482.864468][T10190] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.871572][T10190] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.947399][T10190] device bridge_slave_1 entered promiscuous mode [ 483.775990][T10126] device hsr_slave_0 entered promiscuous mode [ 483.975556][T10126] device hsr_slave_1 entered promiscuous mode [ 484.202148][ T3623] Bluetooth: hci7: command 0x0419 tx timeout [ 485.605509][T10190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 486.325355][T10179] device hsr_slave_0 entered promiscuous mode [ 486.412365][T10179] device hsr_slave_1 entered promiscuous mode [ 486.520700][T10179] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 486.536587][T10179] Cannot create hsr debugfs directory [ 486.564165][T10190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 489.679567][T10204] chnl_net:caif_netlink_parms(): no params data found [ 492.564352][T10190] team0: Port device team_slave_0 added [ 493.131719][ T3557] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 493.452392][T10190] team0: Port device team_slave_1 added [ 494.129988][ T3557] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.168174][T10215] chnl_net:caif_netlink_parms(): no params data found [ 496.408569][ T3557] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.563867][T10190] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 496.570944][T10190] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 496.652006][T10190] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 497.162007][ T3562] Bluetooth: hci1: command 0x0409 tx timeout [ 497.231999][T10190] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 497.238988][T10190] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 497.367181][T10190] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 498.115263][ T3557] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.436690][T10204] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.486483][T10204] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.497226][T10204] device bridge_slave_0 entered promiscuous mode [ 499.242045][ T3567] Bluetooth: hci1: command 0x041b tx timeout [ 499.949807][T10204] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.982050][T10204] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.990286][T10204] device bridge_slave_1 entered promiscuous mode [ 500.602271][ T27] INFO: task syz-executor.1:7853 blocked for more than 143 seconds. [ 500.610542][ T27] Not tainted 5.15.152-syzkaller #0 [ 500.642038][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 500.651326][ T27] task:syz-executor.1 state:D stack:22840 pid: 7853 ppid: 7633 flags:0x00004006 [ 500.762292][ T27] Call Trace: [ 500.765619][ T27] [ 500.768573][ T27] __schedule+0x12c4/0x45b0 [ 500.801978][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 500.810994][ T27] ? print_irqtrace_events+0x210/0x210 [ 500.835057][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 500.842526][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 500.848553][ T27] ? __sched_text_start+0x8/0x8 [ 500.906423][ T27] ? __might_sleep+0xc0/0xc0 [ 500.911133][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 500.939639][ T27] schedule+0x11b/0x1f0 [ 500.951913][ T27] wb_wait_for_completion+0x164/0x290 [ 500.957968][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 500.991919][ T27] ? init_wait_entry+0xd0/0xd0 [ 500.996760][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 501.028153][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 501.041112][ T27] ? down_read_trylock+0x24a/0x3b0 [ 501.050325][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 501.091990][ T27] ? cpumask_next+0xc3/0xf0 [ 501.096603][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 501.113230][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 501.118831][ T27] ext4_da_write_begin+0x228/0xb60 [ 501.131916][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 501.138019][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 501.173246][ T27] ? rcu_is_watching+0x11/0xa0 [ 501.178121][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 501.214145][ T27] generic_perform_write+0x2bf/0x5b0 [ 501.219545][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 501.245409][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.251825][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.271939][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 501.277899][ T27] ? ext4_write_checks+0x255/0x2c0 [ 501.292891][ T27] ext4_buffered_write_iter+0x227/0x360 [ 501.298504][ T27] ext4_file_write_iter+0x87c/0x1990 [ 501.322005][ T3562] Bluetooth: hci1: command 0x040f tx timeout [ 501.361945][ T27] ? _raw_spin_unlock+0x24/0x40 [ 501.367415][ T27] ? follow_page_pte+0xad5/0xb60 [ 501.381945][ T27] ? follow_page_mask+0xb59/0x13f0 [ 501.387112][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 501.426083][ T27] ? follow_page+0x130/0x130 [ 501.430731][ T27] ? find_vma+0xd3/0x230 [ 501.455239][ T27] ? check_vma_flags+0x407/0x490 [ 501.460239][ T27] ? iov_iter_kvec+0x4a/0x170 [ 501.501942][ T27] __kernel_write+0x5b1/0xa60 [ 501.506781][ T27] ? vfs_read+0xe10/0xe10 [ 501.511126][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 501.541768][ T27] ? down_read_killable+0x1d2/0x350 [ 501.571939][ T27] __dump_emit+0x264/0x3a0 [ 501.576495][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 501.611921][ T27] ? dump_emit+0x152/0x3f0 [ 501.616505][ T27] dump_user_range+0x91/0x320 [ 501.621223][ T27] elf_core_dump+0x3c7d/0x4570 [ 501.678946][ T27] ? reacquire_held_locks+0x660/0x660 [ 501.685760][ T27] ? load_elf_library+0xa40/0xa40 [ 501.690898][ T27] ? mark_lock+0x98/0x340 [ 501.701939][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 501.714856][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 501.720453][ T27] ? kmem_cache_alloc+0x128/0x280 [ 501.771942][ T27] do_coredump+0x1852/0x31e0 [ 501.777159][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 501.799533][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 501.825766][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 501.830896][ T27] ? get_signal+0x8ac/0x14e0 [ 501.850792][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 501.871916][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 501.877758][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 501.941932][ T27] get_signal+0xc06/0x14e0 [ 501.946551][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 501.991941][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 501.997797][ T27] ? get_sigframe_size+0x10/0x10 [ 502.031942][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 502.037996][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 502.083244][ T27] exit_to_user_mode_loop+0x97/0x130 [ 502.088588][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 502.126905][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 502.141985][ T27] exc_page_fault+0x342/0x740 [ 502.146727][ T27] asm_exc_page_fault+0x22/0x30 [ 502.151614][ T27] RIP: 0033:0x92 [ 502.181932][ T27] RSP: 002b:0000000020000358 EFLAGS: 00010217 [ 502.223266][ T27] RAX: 0000000000000000 RBX: 00007f433a56ef80 RCX: 00007f433a440da9 [ 502.231302][ T27] RDX: 0000000020000380 RSI: 0000000020000350 RDI: 0000000000020000 [ 502.253594][ T27] RBP: 00007f433a48d47a R08: 0000000020000400 R09: 0000000020000400 [ 502.265605][ T27] R10: 00000000200003c0 R11: 0000000000000206 R12: 0000000000000000 [ 502.293182][ T27] R13: 000000000000000b R14: 00007f433a56ef80 R15: 00007fffe7c3e498 [ 502.301223][ T27] [ 502.362748][ T27] INFO: task syz-executor.1:7908 blocked for more than 145 seconds. [ 502.370765][ T27] Not tainted 5.15.152-syzkaller #0 [ 502.420154][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 502.443263][ T27] task:syz-executor.1 state:D stack:22776 pid: 7908 ppid: 7633 flags:0x00004006 [ 502.483195][ T27] Call Trace: [ 502.486524][ T27] [ 502.489476][ T27] __schedule+0x12c4/0x45b0 [ 502.522247][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 502.528295][ T27] ? print_irqtrace_events+0x210/0x210 [ 502.565577][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 502.570841][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 502.602101][ T27] ? __sched_text_start+0x8/0x8 [ 502.607016][ T27] ? __might_sleep+0xc0/0xc0 [ 502.611692][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 502.657027][ T27] schedule+0x11b/0x1f0 [ 502.661782][ T27] wb_wait_for_completion+0x164/0x290 [ 502.691938][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 502.736105][ T27] ? init_wait_entry+0xd0/0xd0 [ 502.740952][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 502.779161][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 502.788140][ T27] ? down_read_trylock+0x24a/0x3b0 [ 502.793771][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 502.851943][ T27] ? cpumask_next+0xc3/0xf0 [ 502.856515][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 502.871965][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 502.877570][ T27] ext4_da_write_begin+0x228/0xb60 [ 502.901935][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 502.907993][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 502.941928][ T27] ? rcu_is_watching+0x11/0xa0 [ 502.946770][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 502.955546][ T27] generic_perform_write+0x2bf/0x5b0 [ 502.981941][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 502.987295][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 503.002315][ T27] ? ext4_write_checks+0x255/0x2c0 [ 503.007493][ T27] ext4_buffered_write_iter+0x227/0x360 [ 503.038773][ T27] ext4_file_write_iter+0x87c/0x1990 [ 503.063149][ T27] ? _raw_spin_unlock+0x24/0x40 [ 503.074615][ T27] ? follow_page_pte+0xad5/0xb60 [ 503.079630][ T27] ? follow_page_mask+0xb59/0x13f0 [ 503.091753][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 503.097584][ T27] ? follow_page+0x130/0x130 [ 503.110265][ T27] ? find_vma+0xd3/0x230 [ 503.114981][ T27] ? check_vma_flags+0x407/0x490 [ 503.119952][ T27] ? iov_iter_kvec+0x4a/0x170 [ 503.161676][ T27] __kernel_write+0x5b1/0xa60 [ 503.168356][ T27] ? vfs_read+0xe10/0xe10 [ 503.182266][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 503.187354][ T27] ? down_read_killable+0x1d2/0x350 [ 503.194356][ T27] ? __dump_emit+0x14d/0x3a0 [ 503.213254][ T27] __dump_emit+0x264/0x3a0 [ 503.217736][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 503.232959][ T27] ? dump_emit+0x152/0x3f0 [ 503.242248][ T27] dump_user_range+0x91/0x320 [ 503.246979][ T27] elf_core_dump+0x3c7d/0x4570 [ 503.251771][ T27] ? reacquire_held_locks+0x660/0x660 [ 503.281948][ T27] ? load_elf_library+0xa40/0xa40 [ 503.292250][ T27] ? mark_lock+0x98/0x340 [ 503.296628][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 503.301720][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 503.336135][ T27] ? kmem_cache_alloc+0x128/0x280 [ 503.341234][ T27] do_coredump+0x1852/0x31e0 [ 503.365571][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 503.370832][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 503.402071][ T2978] Bluetooth: hci1: command 0x0419 tx timeout [ 503.408486][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 503.424063][ T27] ? get_signal+0x8ac/0x14e0 [ 503.428750][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 503.474119][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 503.479375][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 503.511934][ T27] get_signal+0xc06/0x14e0 [ 503.516993][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 503.539669][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 503.552004][ T27] ? get_sigframe_size+0x10/0x10 [ 503.557005][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 503.569560][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 503.604795][ T27] exit_to_user_mode_loop+0x97/0x130 [ 503.610145][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 503.659449][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 503.669987][ T27] exc_page_fault+0x342/0x740 [ 503.691940][ T27] asm_exc_page_fault+0x22/0x30 [ 503.696858][ T27] RIP: 0033:0x92 [ 503.700423][ T27] RSP: 002b:0000000020000358 EFLAGS: 00010217 [ 503.745735][ T27] RAX: 0000000000000000 RBX: 00007f433a56ef80 RCX: 00007f433a440da9 [ 503.781937][ T27] RDX: 0000000020000380 RSI: 0000000020000350 RDI: 0000000000020000 [ 503.789963][ T27] RBP: 00007f433a48d47a R08: 0000000020000400 R09: 0000000020000400 [ 503.831978][ T27] R10: 00000000200003c0 R11: 0000000000000206 R12: 0000000000000000 [ 503.839999][ T27] R13: 000000000000000b R14: 00007f433a56ef80 R15: 00007fffe7c3e498 [ 503.896677][ T27] [ 503.904081][T10204] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 503.921963][ T27] INFO: task syz-executor.1:7928 blocked for more than 146 seconds. [ 503.930571][ T27] Not tainted 5.15.152-syzkaller #0 [ 503.969772][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 504.029251][ T27] task:syz-executor.1 state:D stack:22816 pid: 7928 ppid: 7633 flags:0x00004006 [ 504.067092][ T27] Call Trace: [ 504.070658][ T27] [ 504.119206][ T27] __schedule+0x12c4/0x45b0 [ 504.125046][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 504.131715][ T27] ? print_irqtrace_events+0x210/0x210 [ 504.191750][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 504.229056][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 504.248236][ T27] ? __sched_text_start+0x8/0x8 [ 504.261912][ T27] ? __might_sleep+0xc0/0xc0 [ 504.291934][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 504.297457][ T27] schedule+0x11b/0x1f0 [ 504.301650][ T27] wb_wait_for_completion+0x164/0x290 [ 504.353344][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 504.362669][ T27] ? init_wait_entry+0xd0/0xd0 [ 504.367587][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 504.408516][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 504.416303][ T27] ? down_read_trylock+0x24a/0x3b0 [ 504.421460][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 504.452046][ T7098] Bluetooth: hci3: command 0x0409 tx timeout [ 504.456736][ T27] ? cpumask_next+0xc3/0xf0 [ 504.471924][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 504.483763][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 504.489474][ T27] ext4_da_write_begin+0x228/0xb60 [ 504.542053][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 504.548116][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 504.575153][ T27] ? rcu_is_watching+0x11/0xa0 [ 504.582510][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 504.587762][ T27] generic_perform_write+0x2bf/0x5b0 [ 504.631952][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 504.637321][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 504.672014][ T27] ? ext4_write_checks+0x255/0x2c0 [ 504.677190][ T27] ext4_buffered_write_iter+0x227/0x360 [ 504.701991][ T27] ext4_file_write_iter+0x87c/0x1990 [ 504.707334][ T27] ? _raw_spin_unlock+0x24/0x40 [ 504.742048][ T27] ? follow_page_pte+0xad5/0xb60 [ 504.753649][ T27] ? follow_page_mask+0xb59/0x13f0 [ 504.758833][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 504.792145][ T27] ? follow_page+0x130/0x130 [ 504.796788][ T27] ? find_vma+0xd3/0x230 [ 504.801056][ T27] ? check_vma_flags+0x407/0x490 [ 504.831940][ T27] ? iov_iter_kvec+0x4a/0x170 [ 504.836688][ T27] __kernel_write+0x5b1/0xa60 [ 504.841404][ T27] ? vfs_read+0xe10/0xe10 [ 504.892021][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 504.897117][ T27] ? down_read_killable+0x1d2/0x350 [ 504.922421][ T27] __dump_emit+0x264/0x3a0 [ 504.926913][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 504.951165][ T27] ? dump_emit+0x152/0x3f0 [ 504.973394][ T27] dump_user_range+0x91/0x320 [ 504.978173][ T27] elf_core_dump+0x3c7d/0x4570 [ 505.008337][ T27] ? reacquire_held_locks+0x660/0x660 [ 505.029987][ T27] ? load_elf_library+0xa40/0xa40 [ 505.048626][ T27] ? mark_lock+0x98/0x340 [ 505.061976][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 505.072361][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 505.078684][ T27] ? kmem_cache_alloc+0x128/0x280 [ 505.096577][ T27] do_coredump+0x1852/0x31e0 [ 505.118500][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 505.135511][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 505.141152][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 505.172108][ T27] ? get_signal+0x8ac/0x14e0 [ 505.176763][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 505.211967][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 505.217284][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 505.252147][ T27] get_signal+0xc06/0x14e0 [ 505.258107][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 505.276921][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 505.292004][ T27] ? get_sigframe_size+0x10/0x10 [ 505.308334][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 505.332121][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 505.337654][ T27] exit_to_user_mode_loop+0x97/0x130 [ 505.369747][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 505.395476][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 505.410610][ T27] exc_page_fault+0x342/0x740 [ 505.420183][ T27] asm_exc_page_fault+0x22/0x30 [ 505.439117][ T27] RIP: 0033:0x92 [ 505.454623][ T27] RSP: 002b:0000000020000358 EFLAGS: 00010217 [ 505.495545][ T27] RAX: 0000000000000000 RBX: 00007f433a56ef80 RCX: 00007f433a440da9 [ 505.526129][ T27] RDX: 0000000020000380 RSI: 0000000020000350 RDI: 0000000000020000 [ 505.552081][ T27] RBP: 00007f433a48d47a R08: 0000000020000400 R09: 0000000020000400 [ 505.571999][ T27] R10: 00000000200003c0 R11: 0000000000000206 R12: 0000000000000000 [ 505.580116][ T27] R13: 000000000000000b R14: 00007f433a56ef80 R15: 00007fffe7c3e498 [ 505.633493][ T27] [ 505.642882][ T27] INFO: task syz-executor.4:7983 blocked for more than 148 seconds. [ 505.654494][ T27] Not tainted 5.15.152-syzkaller #0 [ 505.665405][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 505.722353][ T27] task:syz-executor.4 state:D stack:22552 pid: 7983 ppid: 7641 flags:0x00004006 [ 505.731773][ T27] Call Trace: [ 505.753966][ T27] [ 505.756953][ T27] __schedule+0x12c4/0x45b0 [ 505.761484][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 505.802370][ T27] ? print_irqtrace_events+0x210/0x210 [ 505.807897][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 505.834081][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 505.855833][ T27] ? __sched_text_start+0x8/0x8 [ 505.862454][ T27] ? __might_sleep+0xc0/0xc0 [ 505.882823][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 505.888348][ T27] schedule+0x11b/0x1f0 [ 505.915122][ T27] wb_wait_for_completion+0x164/0x290 [ 505.932154][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 505.938804][ T27] ? init_wait_entry+0xd0/0xd0 [ 505.964644][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 505.970256][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 506.010400][ T27] ? down_read_trylock+0x24a/0x3b0 [ 506.041352][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 506.047903][ T27] ? cpumask_next+0xc3/0xf0 [ 506.073448][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 506.103218][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 506.112267][ T27] ext4_da_write_begin+0x228/0xb60 [ 506.117422][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 506.161484][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 506.167225][ T27] ? rcu_is_watching+0x11/0xa0 [ 506.178626][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 506.186172][ T27] generic_perform_write+0x2bf/0x5b0 [ 506.210087][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 506.232081][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 506.237960][ T27] ? ext4_write_checks+0x255/0x2c0 [ 506.271967][ T27] ext4_buffered_write_iter+0x227/0x360 [ 506.277581][ T27] ext4_file_write_iter+0x87c/0x1990 [ 506.321976][ T27] ? _raw_spin_unlock+0x24/0x40 [ 506.326976][ T27] ? follow_page_pte+0xad5/0xb60 [ 506.345830][ T27] ? follow_page_mask+0xb59/0x13f0 [ 506.351004][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 506.405005][ T27] ? follow_page+0x130/0x130 [ 506.409666][ T27] ? find_vma+0xd3/0x230 [ 506.452291][ T27] ? check_vma_flags+0x407/0x490 [ 506.457291][ T27] ? iov_iter_kvec+0x4a/0x170 [ 506.484507][ T27] __kernel_write+0x5b1/0xa60 [ 506.489238][ T27] ? vfs_read+0xe10/0xe10 [ 506.512130][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 506.517230][ T27] ? down_read_killable+0x1d2/0x350 [ 506.531986][ T7704] Bluetooth: hci3: command 0x041b tx timeout [ 506.541163][ T27] __dump_emit+0x264/0x3a0 [ 506.587133][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 506.602024][ T27] ? dump_emit+0x152/0x3f0 [ 506.606506][ T27] dump_user_range+0x91/0x320 [ 506.622053][ T27] elf_core_dump+0x3c7d/0x4570 [ 506.626879][ T27] ? reacquire_held_locks+0x660/0x660 [ 506.666876][ T27] ? load_elf_library+0xa40/0xa40 [ 506.682073][ T27] ? mark_lock+0x98/0x340 [ 506.692277][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 506.697394][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 506.736895][ T27] ? kmem_cache_alloc+0x128/0x280 [ 506.762100][ T27] do_coredump+0x1852/0x31e0 [ 506.766754][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 506.800756][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 506.816242][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 506.821357][ T27] ? get_signal+0x8ac/0x14e0 [ 506.864146][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 506.869413][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 506.908749][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 506.932008][ T27] get_signal+0xc06/0x14e0 [ 506.942370][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 506.948065][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 506.986871][ T27] ? get_sigframe_size+0x10/0x10 [ 507.002360][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 507.008415][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 507.061926][ T27] exit_to_user_mode_loop+0x97/0x130 [ 507.067265][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 507.103555][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 507.109084][ T27] exc_page_fault+0x342/0x740 [ 507.141920][ T27] asm_exc_page_fault+0x22/0x30 [ 507.146828][ T27] RIP: 0033:0x92 [ 507.150402][ T27] RSP: 002b:0000000020000358 EFLAGS: 00010217 [ 507.201918][ T27] RAX: 0000000000000000 RBX: 00007f551f1a4050 RCX: 00007f551f075da9 [ 507.209936][ T27] RDX: 0000000020000380 RSI: 0000000020000350 RDI: 0000000000020000 [ 507.266513][ T27] RBP: 00007f551f0c247a R08: 0000000020000400 R09: 0000000020000400 [ 507.281903][ T27] R10: 00000000200003c0 R11: 0000000000000206 R12: 0000000000000000 [ 507.290107][ T27] R13: 000000000000006e R14: 00007f551f1a4050 R15: 00007fffadb6dbc8 [ 507.360551][ T27] [ 507.367850][ T27] [ 507.367850][ T27] Showing all locks held in the system: [ 507.371418][T10190] device hsr_slave_0 entered promiscuous mode [ 507.411948][ T27] 1 lock held by khungtaskd/27: [ 507.416837][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 507.467559][ T27] 4 locks held by kworker/u4:3/155: [ 507.483414][ T27] 3 locks held by kworker/0:3/2978: [ 507.488649][ T27] 2 locks held by getty/3262: [ 507.517926][ T27] #0: ffff88814b52d098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 507.569505][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 507.612014][ T27] 6 locks held by kworker/u4:4/3557: [ 507.617337][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 507.676333][ T27] #1: ffffc90003de7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 507.721964][ T27] #2: ffffffff8d9cfe50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 507.731463][ T27] #3: ffffffff8da01028 (devlink_mutex){+.+.}-{3:3}, at: devlink_pernet_pre_exit+0xb1/0x350 [ 507.802020][ T27] #4: ffff88807e365658 (&nsim_bus_dev->nsim_bus_reload_lock){+.+.}-{3:3}, at: nsim_dev_reload_down+0x58/0x160 [ 507.841953][ T27] #5: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: unregister_nexthop_notifier+0x78/0x210 [ 507.891938][ T27] 3 locks held by kworker/0:6/3562: [ 507.897367][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 507.961974][ T27] #1: ffffc90003e37d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 508.011937][ T27] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 508.021686][ T27] 2 locks held by kworker/0:9/3623: [ 508.081964][ T27] #0: ffff8880b9a3a318 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 508.113296][ T27] #1: ffff8880b9a27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 508.142286][ T27] 3 locks held by kworker/u4:6/4175: [ 508.152810][ T27] 2 locks held by kworker/1:10/7704: [ 508.158124][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 508.187622][ T27] #1: ffffc90003277d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 508.232462][ T27] 3 locks held by syz-executor.1/7853: [ 508.251926][ T27] #0: ffff8880231a4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 508.261242][ T27] #1: ffff888033ab17e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 508.297974][ T27] #2: ffff8880231a40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 508.341902][ T27] 3 locks held by syz-executor.1/7908: [ 508.347486][ T27] #0: ffff8880231a4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 508.377190][ T27] #1: ffff888059eef198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 508.421924][ T27] #2: ffff8880231a40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 508.450613][ T27] 3 locks held by syz-executor.1/7928: [ 508.487394][ T27] #0: ffff8880231a4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 508.511985][ T27] #1: ffff88805caa2bd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 508.551968][ T27] #2: ffff8880231a40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 508.575553][ T27] 3 locks held by syz-executor.4/7983: [ 508.581075][ T27] #0: ffff8880231a4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 508.612311][ T25] Bluetooth: hci3: command 0x040f tx timeout [ 508.641994][ T27] #1: ffff888055948de8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 508.702122][ T27] #2: ffff8880231a40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 508.751987][ T27] 3 locks held by syz-executor.4/8016: [ 508.757496][ T27] 2 locks held by syz-executor.4/9152: [ 508.803527][ T27] #0: ffff8880231a6bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 508.839801][ T27] #1: ffff8880b9b3a318 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 508.865147][ T27] 2 locks held by syz-executor.3/9176: [ 508.870649][ T27] 2 locks held by syz-executor.4/9191: [ 508.897455][ T27] 2 locks held by syz-executor.1/9214: [ 508.912008][ T27] 2 locks held by syz-executor.2/9244: [ 508.917530][ T27] 3 locks held by syz-executor.1/9262: [ 508.927743][ T27] 1 lock held by syz-executor.2/9277: [ 508.952119][ T27] 2 locks held by syz-executor.3/9309: [ 508.957624][ T27] 3 locks held by syz-executor.2/9333: [ 509.002068][ T27] 1 lock held by syz-executor.1/9347: [ 509.007489][ T27] 1 lock held by syz-executor.4/9377: [ 509.036328][ T27] 2 locks held by syz-executor.3/9396: [ 509.041831][ T27] 2 locks held by syz-executor.1/9427: [ 509.090904][ T27] 1 lock held by syz-executor.1/9516: [ 509.104425][ T27] 3 locks held by syz-executor.3/9575: [ 509.109927][ T27] 2 locks held by syz-executor.4/9589: [ 509.150290][ T27] 1 lock held by syz-executor.1/9945: [ 509.180539][ T27] 1 lock held by syz-executor.3/9985: [ 509.203392][ T27] 1 lock held by syz-executor.1/9997: [ 509.208811][ T27] 1 lock held by syz-executor.3/10011: [ 509.228278][ T27] 2 locks held by syz-executor.3/10190: [ 509.249409][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 509.274397][ T27] #1: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 509.322248][ T27] 1 lock held by syz-executor.1/10204: [ 509.327754][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 509.362065][ T27] 1 lock held by syz-executor.2/10215: [ 509.367582][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 509.423321][ T27] 2 locks held by syz-executor.4/10235: [ 509.428907][ T27] #0: ffffffff8d9cfe50 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x37b/0x5d0 [ 509.472015][ T27] #1: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_init_net+0x20f/0x700 [ 509.481647][ T27] 1 lock held by syz-executor.0/10243: [ 509.505984][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 509.562641][ T27] [ 509.563118][T10190] device hsr_slave_1 entered promiscuous mode [ 509.565032][ T27] ============================================= [ 509.565032][ T27] [ 509.565044][ T27] NMI backtrace for cpu 0 [ 509.583836][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 509.591835][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 509.601913][ T27] Call Trace: [ 509.605213][ T27] [ 509.608175][ T27] dump_stack_lvl+0x1e3/0x2cb [ 509.612971][ T27] ? console_trylock_spinning+0x259/0x3f0 [ 509.618740][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 509.624402][ T27] ? panic+0x84d/0x84d [ 509.628541][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 509.633708][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 509.638671][ T27] ? __wake_up_klogd+0xd5/0x100 [ 509.643552][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 509.649728][ T27] ? _printk+0xd1/0x111 [ 509.653906][ T27] ? panic+0x84d/0x84d [ 509.658000][ T27] ? __wake_up_klogd+0xcc/0x100 [ 509.662887][ T27] ? panic+0x84d/0x84d [ 509.666978][ T27] ? __rcu_read_unlock+0x92/0x100 [ 509.672029][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 509.678196][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 509.684203][ T27] watchdog+0xe72/0xeb0 [ 509.688438][ T27] kthread+0x3f6/0x4f0 [ 509.692523][ T27] ? hungtask_pm_notify+0x50/0x50 [ 509.697562][ T27] ? kthread_blkcg+0xd0/0xd0 [ 509.702167][ T27] ret_from_fork+0x1f/0x30 [ 509.706679][ T27] [ 509.710668][ T27] Sending NMI from CPU 0 to CPUs 1: [ 509.716083][ C1] NMI backtrace for cpu 1 [ 509.716095][ C1] CPU: 1 PID: 9575 Comm: syz-executor.3 Not tainted 5.15.152-syzkaller #0 [ 509.716114][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 509.716125][ C1] RIP: 0010:mpage_process_page_bufs+0x5b/0x8b0 [ 509.716148][ C1] Code: 03 42 80 3c 30 00 74 08 48 89 ef e8 bf 5c ac ff 48 89 6c 24 30 4c 8b 65 00 49 8d 7c 24 50 48 89 f8 48 c1 e8 03 42 80 3c 30 00 <74> 05 e8 9e 5c ac ff 49 8b 44 24 50 48 89 04 24 4d 8d b4 24 ca 00 [ 509.716164][ C1] RSP: 0018:ffffc9000cfaef80 EFLAGS: 00000246 [ 509.716179][ C1] RAX: 1ffff110067532dc RBX: ffff88802a7183a0 RCX: ffff88807901bb80 [ 509.716194][ C1] RDX: 0000000000000000 RSI: ffff88802a7183a0 RDI: ffff888033a996e0 [ 509.716206][ C1] RBP: ffffc9000cfaf4c0 R08: ffffffff821d88a9 R09: fffff9400014baa1 [ 509.716219][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888033a99690 [ 509.716232][ C1] R13: dffffc0000000000 R14: dffffc0000000000 R15: 00000000000027a5 [ 509.716245][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 509.716260][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 509.716272][ C1] CR2: 000055a5d5ecce00 CR3: 00000000610b3000 CR4: 00000000003506e0 [ 509.716288][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 509.716298][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 509.716308][ C1] Call Trace: [ 509.716313][ C1] [ 509.716319][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 509.716342][ C1] ? read_lock_is_recursive+0x10/0x10 [ 509.716366][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 509.716387][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 509.716411][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 509.716429][ C1] ? nmi_handle+0xf7/0x370 [ 509.716447][ C1] ? mpage_process_page_bufs+0x5b/0x8b0 [ 509.716463][ C1] ? default_do_nmi+0x62/0x150 [ 509.716481][ C1] ? exc_nmi+0xab/0x120 [ 509.716495][ C1] ? end_repeat_nmi+0x16/0x31 [ 509.716517][ C1] ? mpage_prepare_extent_to_map+0xc59/0x1150 [ 509.716537][ C1] ? mpage_process_page_bufs+0x5b/0x8b0 [ 509.716554][ C1] ? mpage_process_page_bufs+0x5b/0x8b0 [ 509.716572][ C1] ? mpage_process_page_bufs+0x5b/0x8b0 [ 509.716589][ C1] [ 509.716594][ C1] [ 509.716604][ C1] mpage_prepare_extent_to_map+0xc9d/0x1150 [ 509.716630][ C1] ? trace_ext4_writepages+0x1e0/0x1e0 [ 509.716655][ C1] ? __ext4_journal_start_sb+0x175/0x370 [ 509.716674][ C1] ext4_writepages+0x1273/0x3d10 [ 509.716712][ C1] ? ext4_readpage+0x300/0x300 [ 509.716733][ C1] ? __kernel_text_address+0x94/0x100 [ 509.716760][ C1] ? __lock_acquire+0x1295/0x1ff0 [ 509.716781][ C1] ? ext4_readpage+0x300/0x300 [ 509.716797][ C1] do_writepages+0x481/0x730 [ 509.716881][ C1] ? __writepage+0x120/0x120 [ 509.716897][ C1] ? read_lock_is_recursive+0x10/0x10 [ 509.716913][ C1] ? filemap_fdatawrite_wbc+0x1cb/0x230 [ 509.716931][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 509.716945][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 509.716966][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 509.716983][ C1] ? wbc_attach_and_unlock_inode+0x5e8/0x600 [ 509.717003][ C1] filemap_fdatawrite_wbc+0x1d6/0x230 [ 509.717022][ C1] filemap_flush+0x10c/0x150 [ 509.717037][ C1] ? ima_file_free+0x10f/0x3c0 [ 509.717090][ C1] ? filemap_fdatawrite_range+0x1b0/0x1b0 [ 509.717105][ C1] ? __mutex_unlock_slowpath+0x218/0x750 [ 509.717126][ C1] ? rcu_is_watching+0x11/0xa0 [ 509.717145][ C1] ext4_release_file+0x7d/0x300 [ 509.717161][ C1] ? ext4_file_open+0x710/0x710 [ 509.717178][ C1] __fput+0x3bf/0x890 [ 509.717201][ C1] task_work_run+0x129/0x1a0 [ 509.717221][ C1] do_exit+0x6a3/0x2480 [ 509.717265][ C1] ? put_task_struct+0x80/0x80 [ 509.717286][ C1] ? get_signal+0x8ac/0x14e0 [ 509.717303][ C1] do_group_exit+0x144/0x310 [ 509.717321][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 509.717338][ C1] get_signal+0xc66/0x14e0 [ 509.717364][ C1] arch_do_signal_or_restart+0xc3/0x1890 [ 509.717390][ C1] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 509.717412][ C1] ? get_sigframe_size+0x10/0x10 [ 509.717431][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 509.717453][ C1] ? exit_to_user_mode_loop+0x39/0x130 [ 509.717471][ C1] exit_to_user_mode_loop+0x97/0x130 [ 509.717487][ C1] exit_to_user_mode_prepare+0xb1/0x140 [ 509.717503][ C1] irqentry_exit_to_user_mode+0x5/0x40 [ 509.717519][ C1] exc_page_fault+0x342/0x740 [ 509.717538][ C1] asm_exc_page_fault+0x22/0x30 [ 509.717554][ C1] RIP: 0033:0x92 [ 509.717565][ C1] Code: Unable to access opcode bytes at RIP 0x68. [ 509.717571][ C1] RSP: 002b:0000000020000358 EFLAGS: 00010217 [ 509.717584][ C1] RAX: 0000000000000000 RBX: 00007f05d0c8d050 RCX: 00007f05d0b5eda9 [ 509.717595][ C1] RDX: 0000000020000380 RSI: 0000000020000350 RDI: 0000000000020000 [ 509.717606][ C1] RBP: 00007f05d0bab47a R08: 0000000020000400 R09: 0000000020000400 [ 509.717618][ C1] R10: 00000000200003c0 R11: 0000000000000206 R12: 0000000000000000 [ 509.717628][ C1] R13: 000000000000006e R14: 00007f05d0c8d050 R15: 00007ffcf2688618 [ 509.717647][ C1] [ 509.718195][T10190] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 510.018179][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 510.226697][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 510.234696][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 510.244776][ T27] Call Trace: [ 510.248074][ T27] [ 510.251016][ T27] dump_stack_lvl+0x1e3/0x2cb [ 510.255718][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 510.261372][ T27] ? panic+0x84d/0x84d [ 510.265468][ T27] panic+0x318/0x84d [ 510.269381][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 510.275037][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 510.281225][ T27] ? fb_is_primary_device+0xcc/0xcc [ 510.286451][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 510.292550][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 510.298736][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 510.305001][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 510.311363][ T27] watchdog+0xeb0/0xeb0 [ 510.315551][ T27] kthread+0x3f6/0x4f0 [ 510.319644][ T27] ? hungtask_pm_notify+0x50/0x50 [ 510.324686][ T27] ? kthread_blkcg+0xd0/0xd0 [ 510.329294][ T27] ret_from_fork+0x1f/0x30 [ 510.333771][ T27] [ 510.336963][ T27] Kernel Offset: disabled [ 510.341287][ T27] Rebooting in 86400 seconds..