0x7f0000000140), 0x0) [ 971.214744][T16247] syz-executor.0 (16247) used greatest stack depth: 17112 bytes left [ 971.250803][T15706] Bluetooth: hci5: command 0x041b tx timeout [ 971.650676][T15951] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.657648][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.671732][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 971.705987][T15706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 971.741005][T15706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 971.749423][T15706] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.756534][T15706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 971.821264][T15704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 971.847013][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 971.870645][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 971.879277][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.886429][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 971.930357][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 971.950600][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 971.986305][T15895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 972.042117][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 972.053693][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 972.062906][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 972.076586][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 972.121117][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 972.144396][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.330424][T15706] Bluetooth: hci5: command 0x040f tx timeout [ 973.649953][T15951] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 973.690453][T15951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 973.721048][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 973.730885][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 973.750895][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 973.781334][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 973.790824][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 973.810813][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 973.830814][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 973.894389][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 973.919936][T15895] device veth0_vlan entered promiscuous mode [ 973.957539][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 973.976975][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 974.011142][T15895] device veth1_vlan entered promiscuous mode [ 974.038032][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 974.046610][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 974.090951][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 974.137029][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 974.146031][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 974.200915][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 974.214564][T15895] device veth0_macvtap entered promiscuous mode [ 974.239552][T16638] chnl_net:caif_netlink_parms(): no params data found [ 974.273043][T15951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 974.306980][T15895] device veth1_macvtap entered promiscuous mode [ 974.325136][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 974.334230][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 974.361328][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 974.389543][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 974.964701][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.010688][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.040271][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.060243][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.070084][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 975.100920][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.132280][T15895] batman_adv: batadv0: Interface activated: batadv_slave_0 21:27:25 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 975.410677][T15706] Bluetooth: hci5: command 0x0419 tx timeout [ 975.521871][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 975.540718][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 975.565111][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.590610][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.621444][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.652636][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.692642][T15895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 975.724319][T15895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 975.763158][T15895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 975.803824][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 975.815158][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 975.843660][T15895] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.852745][T15895] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.861952][T15895] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 975.871067][T15895] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:27:26 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 21:27:26 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:26 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 21:27:27 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:27 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)) [ 978.102459][T15706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 978.111324][T15706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 978.151333][T16638] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.158695][T16638] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.180317][T16638] device bridge_slave_0 entered promiscuous mode [ 978.197824][T16638] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.213631][T16638] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.232298][T16638] device bridge_slave_1 entered promiscuous mode 21:27:27 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 978.853776][T16638] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:27:28 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 21:27:28 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x0, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:29 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") [ 979.679438][T16638] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 979.698461][T15951] device veth0_vlan entered promiscuous mode [ 979.737228][ T7534] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 979.746233][T15951] device veth1_vlan entered promiscuous mode [ 979.760433][ T7534] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 980.098793][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 980.111045][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 980.119366][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 21:27:29 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x0, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 980.151255][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 980.382637][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 980.395038][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 980.425649][T16638] team0: Port device team_slave_0 added [ 980.453048][T16638] team0: Port device team_slave_1 added [ 980.586284][ T3584] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 980.587375][T16638] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 980.607835][ T3584] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 980.617389][T16638] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 21:27:30 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") [ 980.690256][T16638] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 980.720372][T16638] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 980.727338][T16638] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 980.782987][T16638] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 21:27:30 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x0, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 981.198154][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 981.214910][T15951] device veth0_macvtap entered promiscuous mode [ 981.246221][T16357] netdevsim netdevsim2 netdevsim0: renamed from eth0 21:27:31 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") 21:27:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 981.661260][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 981.669944][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 21:27:31 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 981.722619][T15951] device veth1_macvtap entered promiscuous mode [ 981.738027][T16357] netdevsim netdevsim2 netdevsim1: renamed from eth1 21:27:31 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 981.774215][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 981.791033][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 981.806818][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 981.858042][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 981.868861][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 981.900312][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 981.910158][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 981.940315][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:27:31 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d") [ 981.960877][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 981.974367][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 982.011819][T15951] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 982.019676][T16357] netdevsim netdevsim2 netdevsim2: renamed from eth2 21:27:31 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:31 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d") 21:27:32 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 982.547435][T16357] netdevsim netdevsim2 netdevsim3: renamed from eth3 21:27:32 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d") 21:27:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) 21:27:32 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb") 21:27:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) 21:27:32 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 983.198632][T16638] device hsr_slave_0 entered promiscuous mode 21:27:32 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb") [ 983.283079][T16638] device hsr_slave_1 entered promiscuous mode 21:27:33 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 983.631082][T16638] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 983.638721][T16638] Cannot create hsr debugfs directory [ 983.664338][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 21:27:33 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb") [ 983.681111][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 983.719061][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.762796][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.789054][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.811502][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.823931][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.843169][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 983.861446][T15951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 983.884731][T15951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:27:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) [ 983.911851][T15951] batman_adv: batadv0: Interface activated: batadv_slave_1 21:27:33 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a") 21:27:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) 21:27:33 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:34 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a") [ 984.501694][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 984.521668][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 984.556146][T15951] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 984.574012][T15951] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 984.595975][T15951] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 21:27:34 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x0, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 984.623619][T15951] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:27:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) 21:27:34 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a") 21:27:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) 21:27:35 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6d") 21:27:35 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x0, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) 21:27:35 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x0, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 21:27:35 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6d") 21:27:36 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 986.624778][T16357] 8021q: adding VLAN 0 to HW filter on device bond0 21:27:36 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6d") 21:27:36 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 986.940336][T16357] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.962625][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 986.971454][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 986.986054][ T7534] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 987.015311][ T7534] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 21:27:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 21:27:37 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") 21:27:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 21:27:37 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 988.023153][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 988.041593][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 988.062235][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 988.070749][T10353] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.077819][T10353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 988.112861][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:27:37 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") [ 988.121980][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 988.152823][T10353] bridge0: port 2(bridge_slave_1) entered blocking state [ 988.159914][T10353] bridge0: port 2(bridge_slave_1) entered forwarding state 21:27:37 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 988.193161][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.202134][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 988.264884][ T7534] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 988.266128][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 988.276123][ T7534] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 988.290315][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 988.314213][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 988.322920][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 988.349365][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 21:27:38 executing program 4: getpid() getpid() gettid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 988.376767][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 988.392515][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 988.412801][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) 21:27:38 executing program 4: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") 21:27:38 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:38 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1ce") 21:27:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x0) 21:27:38 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:38 executing program 4: getpid() getpid() gettid() r0 = getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r1, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:38 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:38 executing program 4: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1ce") 21:27:39 executing program 1: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:39 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:39 executing program 0: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1ce") [ 989.864016][T16357] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 989.905723][T16357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 989.931480][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 989.939924][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 989.990933][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:27:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x0) [ 990.300551][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 990.308320][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 990.339319][T16357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 990.403421][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 990.430962][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 21:27:40 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x0) 21:27:40 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:40 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:40 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 21:27:40 executing program 0: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 991.313712][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 991.332306][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 991.383035][T16357] device veth0_vlan entered promiscuous mode [ 991.398200][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 991.406869][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 991.430891][T16357] device veth1_vlan entered promiscuous mode [ 991.486052][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 991.497759][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 21:27:41 executing program 4: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x10}}], 0x10}, 0x0) [ 991.540429][T16357] device veth0_macvtap entered promiscuous mode [ 991.573530][T16357] device veth1_macvtap entered promiscuous mode [ 991.623764][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 991.662547][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.710246][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 991.756256][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.781624][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 991.800760][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.850636][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 991.890484][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:27:41 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 991.928198][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 991.950243][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 991.974691][T16357] batman_adv: batadv0: Interface activated: batadv_slave_0 21:27:41 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x1, &(0x7f00000024c0)=@raw=[@call], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 992.004641][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 992.021226][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 992.081183][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 992.112447][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 992.138145][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 992.183381][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:27:41 executing program 1: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 992.230269][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 992.260836][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 992.300299][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 992.330249][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 992.340129][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 992.410470][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 992.440515][T16357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 992.490278][T16357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 992.526345][T16357] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 992.544061][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 992.572401][T15271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 992.607748][T16357] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 992.634105][T16357] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 21:27:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x10}}], 0x10}, 0x0) [ 992.670862][T16357] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 992.679711][T16357] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 992.842776][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.849090][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 21:27:42 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:42 executing program 0: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:42 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x1, &(0x7f00000024c0)=@raw=[@call], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x10}}], 0x10}, 0x0) 21:27:43 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:43 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x1, &(0x7f00000024c0)=@raw=[@call], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:44 executing program 1: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:44 executing program 4: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), 0x0) 21:27:44 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:44 executing program 1: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), 0x0) 21:27:45 executing program 4: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:45 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:45 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:45 executing program 1: getpid() getpid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:46 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:46 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:46 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 997.194449][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 997.233592][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 997.676540][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 997.696581][T16638] netdevsim netdevsim3 netdevsim0: renamed from eth0 21:27:47 executing program 4: getpid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:48 executing program 0: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:48 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:48 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:49 executing program 1: syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:49 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:50 executing program 4: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:50 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:50 executing program 1: getpid() getpid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:50 executing program 4: syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:51 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:51 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:51 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1002.212276][T14466] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1002.212467][T16638] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1002.228602][T14466] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1002.265406][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1002.314825][T16638] netdevsim netdevsim3 netdevsim2: renamed from eth2 21:27:52 executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000002c0)=r0, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="ad0e807bae60d8d646f5b2239e59", &(0x7f0000000040)=""/227, &(0x7f0000000140)="d8fe21c37e65f109caf928620695507a2aeceebbb7e5771ba470d9a10499c0996d31b1a988bc4c05714f9667fa5a70817e09fbe7709d525e87b3bee7366a20dee8cdbbed085c88e01686b984d0359e6d6f708996f951036b709f61d7a0ba60fc494520c61513f55641a1bd4f3167a5232d17ef9b82cada", &(0x7f00000001c0)="2a4f4465a62a76bcab4c76bca300aed9267567f03e0658c6f42b363ef3b497ef609c120c1cc7f76341853723525950b4dfe7d86816827b21433cf7b026eb89ce6b8266f25c4caa13d48eb169214c0cda670f36a5d17d9bbc95768476288531ca5964ce1881d1a5d5f2b04ea677adb82081c52286368df69916f57e927fadf29b4671898c7b26b8a636cd0e9b885c6f5ce6f0b86286f04b1886b515eb85884313410668b862ecf9e5d6e42d08cfa0", 0x1ff, r3}, 0x38) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffd3e) 21:27:52 executing program 2: syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:52 executing program 2: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:52 executing program 2: getpid() syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:52 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1003.020938][T16638] netdevsim netdevsim3 netdevsim3: renamed from eth3 21:27:52 executing program 2: getpid() syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:53 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:53 executing program 0: getpid() syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1003.700809][T16638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1003.756413][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1003.764876][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1003.804241][T16638] 8021q: adding VLAN 0 to HW filter on device team0 [ 1003.842809][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1003.852219][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1003.883031][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.890290][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state 21:27:53 executing program 2: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:53 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:53 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1004.341547][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.352955][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.391018][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.432833][ T3564] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.439917][ T3564] bridge0: port 2(bridge_slave_1) entered forwarding state 21:27:54 executing program 2: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000", 0x15, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1004.492939][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.519232][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.561254][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1004.600683][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.610125][ T1151] device bridge_slave_1 left promiscuous mode [ 1004.623477][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state 21:27:54 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:54 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:54 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:55 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:55 executing program 4: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1006.014185][ T1151] device bridge_slave_0 left promiscuous mode [ 1006.050309][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state 21:27:55 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:56 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(0x0, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:56 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:27:56 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1006.958283][ T1151] device bridge_slave_1 left promiscuous mode [ 1006.964670][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state 21:27:56 executing program 4: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 21:27:56 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, 0x0) 21:27:56 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 21:27:56 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1007.229731][ T1151] device bridge_slave_0 left promiscuous mode [ 1007.237293][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.274659][ T1151] device hsr_slave_0 left promiscuous mode [ 1007.314606][ T1151] device hsr_slave_1 left promiscuous mode 21:27:57 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1007.900952][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1007.922159][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1007.975743][ T1151] device bridge_slave_1 left promiscuous mode [ 1007.998515][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.501987][ T1151] device bridge_slave_0 left promiscuous mode [ 1008.514145][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.150425][ T1151] device hsr_slave_0 left promiscuous mode [ 1009.493597][ T1151] device hsr_slave_1 left promiscuous mode [ 1010.031015][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1010.262419][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1010.643902][ T1151] device bridge_slave_1 left promiscuous mode [ 1010.650122][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.420853][ T1151] device bridge_slave_0 left promiscuous mode [ 1011.427117][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.581581][ T1151] device hsr_slave_0 left promiscuous mode [ 1011.601746][ T1151] device hsr_slave_1 left promiscuous mode [ 1011.641761][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1011.651322][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1011.695043][ T1151] device bridge_slave_1 left promiscuous mode [ 1011.720659][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.741321][ T1151] device bridge_slave_0 left promiscuous mode [ 1011.760432][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.780846][ T1151] device hsr_slave_0 left promiscuous mode [ 1011.840421][ T1151] device hsr_slave_1 left promiscuous mode [ 1011.850608][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1011.872338][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1011.892377][ T1151] device bridge_slave_1 left promiscuous mode [ 1011.898575][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.921720][ T1151] device bridge_slave_0 left promiscuous mode [ 1011.927933][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.941357][ T1151] device hsr_slave_0 left promiscuous mode [ 1011.948834][ T1151] device hsr_slave_1 left promiscuous mode [ 1011.955398][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1011.963815][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1011.973789][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1011.981574][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1011.989914][ T1151] device bridge_slave_1 left promiscuous mode [ 1011.996364][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.004845][ T1151] device bridge_slave_0 left promiscuous mode [ 1012.011148][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.023601][ T1151] device hsr_slave_0 left promiscuous mode [ 1012.029921][ T1151] device hsr_slave_1 left promiscuous mode [ 1012.036458][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1012.048096][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1012.059219][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1012.066909][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1012.076319][ T1151] device bridge_slave_1 left promiscuous mode [ 1012.082579][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.090555][ T1151] device bridge_slave_0 left promiscuous mode [ 1012.096743][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.117150][ T1151] device veth1_macvtap left promiscuous mode [ 1012.123466][ T1151] device veth0_macvtap left promiscuous mode [ 1012.129513][ T1151] device veth1_vlan left promiscuous mode [ 1012.135390][ T1151] device veth0_vlan left promiscuous mode [ 1012.144041][ T1151] device veth1_macvtap left promiscuous mode [ 1012.150046][ T1151] device veth0_macvtap left promiscuous mode [ 1012.156997][ T1151] device veth1_vlan left promiscuous mode [ 1012.162897][ T1151] device veth0_vlan left promiscuous mode [ 1012.444608][ T1151] bond0 (unregistering): Released all slaves [ 1012.515689][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1012.531065][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1012.599697][ T1151] bond0 (unregistering): Released all slaves [ 1012.717702][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1012.729266][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1012.746414][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1012.759546][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1012.830041][ T1151] bond0 (unregistering): Released all slaves [ 1012.949798][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1012.969169][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1012.983728][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1012.999365][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1013.067096][ T1151] bond0 (unregistering): Released all slaves [ 1013.192091][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1013.206225][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1013.219641][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1013.233906][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1013.300511][ T1151] bond0 (unregistering): Released all slaves [ 1013.410442][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1013.424210][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1013.437340][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1013.451683][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1013.520015][ T1151] bond0 (unregistering): Released all slaves [ 1013.668077][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1013.683938][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1013.697960][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1013.714507][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1013.788283][ T1151] bond0 (unregistering): Released all slaves [ 1013.924781][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1013.938804][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1013.952397][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1013.978291][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1014.046326][ T1151] bond0 (unregistering): Released all slaves [ 1014.086999][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1014.095717][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1014.104781][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1014.113788][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1014.123330][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1014.222127][T16638] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1014.234341][T16638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1014.244437][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1014.254303][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1014.337192][T15704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1014.345743][T15704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1014.356355][T16638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1014.403174][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1014.431212][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1014.470918][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1014.480037][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1014.523428][T16638] device veth0_vlan entered promiscuous mode [ 1014.533157][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1014.541687][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1014.553990][T16638] device veth1_vlan entered promiscuous mode [ 1014.661388][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1014.681804][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1014.710683][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1014.731455][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1014.742308][T16638] device veth0_macvtap entered promiscuous mode [ 1014.763299][T16638] device veth1_macvtap entered promiscuous mode [ 1014.829587][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1014.865836][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1014.895786][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1014.918036][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1014.939244][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1014.961950][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1014.983233][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1015.014070][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1015.049210][T16638] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1015.069881][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1015.078698][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1015.095733][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1015.113698][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1015.134964][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1015.152479][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1015.173409][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1015.194935][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1015.215102][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1015.236916][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1015.259346][T16638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1015.280766][T16638] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1015.304764][T16638] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1015.320144][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1015.331412][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1015.354678][T16638] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.371182][T16638] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.379899][T16638] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.407283][T16638] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.512525][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1015.523560][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1015.561696][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1015.591406][ T7534] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1015.609849][ T7534] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1015.619306][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:28:05 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x8, &(0x7f0000002180)=@raw=[@printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:05 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 21:28:05 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x0, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:05 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") 21:28:05 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") 21:28:05 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") 21:28:06 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d") 21:28:06 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d") 21:28:06 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:06 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb") 21:28:06 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a") 21:28:07 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1017.894735][T17345] chnl_net:caif_netlink_parms(): no params data found 21:28:07 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a") [ 1018.158941][T17347] chnl_net:caif_netlink_parms(): no params data found [ 1018.195809][T17349] chnl_net:caif_netlink_parms(): no params data found 21:28:07 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x0, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1018.248417][T17354] chnl_net:caif_netlink_parms(): no params data found 21:28:08 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6d") [ 1018.513151][T17345] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.520829][T17345] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.529133][T17345] device bridge_slave_0 entered promiscuous mode [ 1018.753297][T17345] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.773668][T17345] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.809506][T17345] device bridge_slave_1 entered promiscuous mode 21:28:08 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1018.877003][T17347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.884140][T17347] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.899891][T17347] device bridge_slave_0 entered promiscuous mode 21:28:08 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") [ 1019.220465][T17349] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.227550][T17349] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.240603][T10353] Bluetooth: hci0: command 0x0409 tx timeout [ 1019.241460][T17349] device bridge_slave_0 entered promiscuous mode [ 1019.261170][T17347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.268276][T17347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.294840][T17347] device bridge_slave_1 entered promiscuous mode [ 1019.320863][ T3535] Bluetooth: hci1: command 0x0409 tx timeout [ 1019.327162][T10353] Bluetooth: hci2: command 0x0409 tx timeout 21:28:09 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") [ 1019.379241][T17345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1019.400587][T17349] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.407674][T17349] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.441489][T17349] device bridge_slave_1 entered promiscuous mode [ 1019.490295][ T3535] Bluetooth: hci3: command 0x0409 tx timeout [ 1019.580322][T17354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.588455][T17354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.611430][T17354] device bridge_slave_0 entered promiscuous mode [ 1019.643812][T17345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:28:09 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1019.793896][T17347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1019.831315][T17354] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.838852][T17354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.871606][T17354] device bridge_slave_1 entered promiscuous mode 21:28:09 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1019.938180][T17345] team0: Port device team_slave_0 added [ 1020.001765][T17347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1020.054275][T17345] team0: Port device team_slave_1 added [ 1020.062884][T17349] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1020.093130][T17349] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:28:09 executing program 3: getpid() getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1020.334383][T17347] team0: Port device team_slave_0 added [ 1020.365876][T17354] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:28:10 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1020.588729][T17345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1020.597193][T17345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.652490][T17345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1020.756460][T17347] team0: Port device team_slave_1 added [ 1020.773941][T17354] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1020.790861][T17345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1020.797828][T17345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.850385][T17345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1020.866926][T17349] team0: Port device team_slave_0 added 21:28:10 executing program 3: getpid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1020.942888][T17349] team0: Port device team_slave_1 added [ 1021.041843][T17347] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1021.048841][T17347] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.118929][T17347] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1021.222314][T17354] team0: Port device team_slave_0 added 21:28:10 executing program 3: syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1021.322032][T15703] Bluetooth: hci0: command 0x041b tx timeout [ 1021.343789][T17347] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1021.360366][T17347] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.408472][T17347] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1021.410300][T15707] Bluetooth: hci2: command 0x041b tx timeout [ 1021.450318][T15707] Bluetooth: hci1: command 0x041b tx timeout [ 1021.475569][T17345] device hsr_slave_0 entered promiscuous mode [ 1021.501307][T17345] device hsr_slave_1 entered promiscuous mode [ 1021.526621][T17354] team0: Port device team_slave_1 added [ 1021.558604][T17349] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1021.565720][T15707] Bluetooth: hci3: command 0x041b tx timeout 21:28:11 executing program 3: syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1021.584055][T17349] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.619279][T17349] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1021.715244][T17349] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1021.740406][T17349] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.787126][T17349] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 21:28:11 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:11 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1022.342270][T17354] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1022.349246][T17354] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 21:28:12 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") [ 1022.389434][T17354] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1022.729104][T17347] device hsr_slave_0 entered promiscuous mode [ 1022.743385][T17347] device hsr_slave_1 entered promiscuous mode [ 1022.757826][T17347] debugfs: Directory 'hsr0' with parent 'hsr' already present! 21:28:12 executing program 3: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357a") [ 1022.775000][T17347] Cannot create hsr debugfs directory [ 1022.941101][T17354] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1022.948078][T17354] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 21:28:12 executing program 3: getpid() syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1023.034340][T17354] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 21:28:12 executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000002c0)=r0, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="ad0e807bae60d8d646f5b2239e59", &(0x7f0000000040)=""/227, &(0x7f0000000140)="d8fe21c37e65f109caf928620695507a2aeceebbb7e5771ba470d9a10499c0996d31b1a988bc4c05714f9667fa5a70817e09fbe7709d525e87b3bee7366a20dee8cdbbed085c88e01686b984d0359e6d6f708996f951036b709f61d7a0ba60fc494520c61513f55641a1bd4f3167a5232d17ef9b82cada", &(0x7f00000001c0)="2a4f4465a62a76bcab4c76bca300aed9267567f03e0658c6f42b363ef3b497ef609c120c1cc7f76341853723525950b4dfe7d86816827b21433cf7b026eb89ce6b8266f25c4caa13d48eb169214c0cda670f36a5d17d9bbc95768476288531ca5964ce1881d1a5d5f2b04ea677adb82081c52286368df69916f57e927fadf29b4671898c7b26b8a636cd0e9b885c6f5ce6f0b86286f04b1886b515eb85884313410668b862ecf9e5d6e42d08cfa0", 0x1ff, r3}, 0x38) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffd3e) [ 1023.148170][T17349] device hsr_slave_0 entered promiscuous mode [ 1023.155165][T17349] device hsr_slave_1 entered promiscuous mode [ 1023.162623][T17349] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1023.174628][T17349] Cannot create hsr debugfs directory [ 1023.310939][ T1151] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:13 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d93fbde2ad526ba1035ab094b89c076b0d414c40110fc6c91689b58bae9da81be78d540d73c3d1f337440d521a550e6cb7dc88b2b651e202b6d22489a06fd5f00f896860b77778e36239dc0b7926a4214b5780b85c7706fbf275cbd56fde5bb361c33c485cc1d5aeea4c2bc56d0451b4cdbdfaa4dfe9ed44762d6f7d5c49c99577e3f8e1a98a8c5f630f740bd20cabd5a8e4c85fdd3bdf2ea884c061fad66b06b7161275fa7a504b4e385cf219b6e09b111802b5376db0793ca3643568c71cd54fa0563772105537a9ea681fc06c", 0xce}, {&(0x7f0000000100)="e1cb4c3db488897768e79eddcfef57b70128d7eb3c8fb069fe3dc0", 0x1b}], 0x2, &(0x7f0000000180)=[{0x30, 0x1, 0x1, "4a4089441ab0360e1260e816f2aa231511e122e90785eb8b26"}, {0xc8, 0x6, 0x5, "2f41cc54a643d9dde0018dcb845333348aaac4b2301ea80ea2b0b5576d4a01feb03c1f4cf7aa2d8b22d7c35c1cd4f557199c5c1f732f99a48583d86064c56fd9bf13d3b9e9505cb0117471d112ca6d8fd9f88a8c7b05d5088f2d827ad10d11ca857ac0f5f4c0ec9e89554853d00733e8b962e67dceddbeb9ed05ba571db51480aa85cb96ca60185f8cec71ad8f1696bd8efd2c27725647222b2a953890d713be6ce85e3dd28518146dd6a539c0732eea2db2"}, {0xa8, 0x109, 0xfffffffe, "f1947295065b4076f93ff64395c2985770d425539196727eff959d9c59262f097b66ce8cf59b6ab3ab74372e7d2cd3f3654d79b768dabe2f06129ae57f2f3b75390bb1cda5673935eac390b38dab437d1e80b7391c1006651329f03b8f356bc68b6afe35831cec8626073526e0256a87d3f3a4cc0350ef805efafc72f8f38195ffb533add56a365e301246f7f124dbbb145a2776"}, {0x50, 0x108, 0x9, "885bc7551b2c82147119cf1249cb6020babfdf602c2093e777d27c73a2f06b58ff25f491d4578e52f606373e763065e91d91f9c08ea74ea616ed4a1975d6"}, {0xc0, 0x119, 0xea2, "9fa3e400d87f84bb9c80c3be9c2bfbcd2af8fe5b1b1b672ff08a33f6488f7fee5632e79f3f5f3e09fd667e40dc04243f591d3123c46b1d18d1cffcbe974d8990758f17eda47568666e80856c91ac83b660aca5dff66977589ab641d43e2a5f853e84aa3bb6d926dd58cc1de3c5821b003600443c1622ab65bc5d862973c8078deb142dcb3f9e69034c65225fa09d5292aaf351f2543fb5c85c37be7d395e01e04710ef1c1c089376219f3a33c1f6"}, {0xc8, 0x108, 0x0, "c68968431b2524d41371704da3c3db8ffbe0c6f1344490c2deb5f981b78d04c0dd11693fe0de21ff089679b4c874d41b4baa70b4aec6269fdcc3f909c64de201d380a17a0890674afa2ae94865f92f90eac6fe25762b93c0b62ed1667baa8d968622fb83b391ece76cb34d47aeeb239a18a9ed1a73166c3ea84438a1f75c145289a7eb4ad6a7643d9ee609a3d05482b3d560cc28e60aa3d0b3a1baad25354c7b24db69e3aa63329bcbce834a18b6dca542c8685970"}, {0xe0, 0x1, 0x6, "ba50eed378243b7b5bf7799607d46e93808b0fef1c9bf2c89d2a876e53fb491ad0d2d95bbdc95348c7cad9707ec648a4034214a0993b6965137a2d8f1e5891429e27ee44a26df6e01fc4626b56356509996c00a5794980394ec54f01a5b86a4f468e3163e3deba6b98f804951fec3f61f865aa14b92e603c1bfb7a8e6c355d73894ff980dbeb0df739e6d3b51de482623d284946215b02c6f8b9ba0228d0c1c185ac174813978ffba509828ef2203a89edc3a6b6e2fb850e5f8a5d1fa547d3e0b56f70383f11794eabb4d8"}, {0xa8, 0x102, 0x2, "61c4f17eb27579f107f4af6fb9714a7cb6d2b8437497a2932daaf1e9fce899050fa5315d94c9299e667fe6cc3075beb0e8f022f61bc9f0a305a854c821cf2eb07c487bd578299d5a73f186654f87ce876a25833e2d427413c863b088505745ec6a4c09a9736fb966e73da03fb983e8dec39aeea397256846f77f6f9a6a44d20a2488f71620099e8178e1cac6f7f329194251"}], 0x500}, 0x40080) [ 1023.411464][T15707] Bluetooth: hci0: command 0x040f tx timeout [ 1023.490334][T15707] Bluetooth: hci1: command 0x040f tx timeout [ 1023.496668][T15707] Bluetooth: hci2: command 0x040f tx timeout 21:28:13 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffdbd) [ 1023.640489][T15703] Bluetooth: hci3: command 0x040f tx timeout 21:28:13 executing program 3: socket$kcm(0x29, 0x0, 0x0) (async) r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d93fbde2ad526ba1035ab094b89c076b0d414c40110fc6c91689b58bae9da81be78d540d73c3d1f337440d521a550e6cb7dc88b2b651e202b6d22489a06fd5f00f896860b77778e36239dc0b7926a4214b5780b85c7706fbf275cbd56fde5bb361c33c485cc1d5aeea4c2bc56d0451b4cdbdfaa4dfe9ed44762d6f7d5c49c99577e3f8e1a98a8c5f630f740bd20cabd5a8e4c85fdd3bdf2ea884c061fad66b06b7161275fa7a504b4e385cf219b6e09b111802b5376db0793ca3643568c71cd54fa0563772105537a9ea681fc06c", 0xce}, {&(0x7f0000000100)="e1cb4c3db488897768e79eddcfef57b70128d7eb3c8fb069fe3dc0", 0x1b}], 0x2, &(0x7f0000000180)=[{0x30, 0x1, 0x1, "4a4089441ab0360e1260e816f2aa231511e122e90785eb8b26"}, {0xc8, 0x6, 0x5, "2f41cc54a643d9dde0018dcb845333348aaac4b2301ea80ea2b0b5576d4a01feb03c1f4cf7aa2d8b22d7c35c1cd4f557199c5c1f732f99a48583d86064c56fd9bf13d3b9e9505cb0117471d112ca6d8fd9f88a8c7b05d5088f2d827ad10d11ca857ac0f5f4c0ec9e89554853d00733e8b962e67dceddbeb9ed05ba571db51480aa85cb96ca60185f8cec71ad8f1696bd8efd2c27725647222b2a953890d713be6ce85e3dd28518146dd6a539c0732eea2db2"}, {0xa8, 0x109, 0xfffffffe, "f1947295065b4076f93ff64395c2985770d425539196727eff959d9c59262f097b66ce8cf59b6ab3ab74372e7d2cd3f3654d79b768dabe2f06129ae57f2f3b75390bb1cda5673935eac390b38dab437d1e80b7391c1006651329f03b8f356bc68b6afe35831cec8626073526e0256a87d3f3a4cc0350ef805efafc72f8f38195ffb533add56a365e301246f7f124dbbb145a2776"}, {0x50, 0x108, 0x9, "885bc7551b2c82147119cf1249cb6020babfdf602c2093e777d27c73a2f06b58ff25f491d4578e52f606373e763065e91d91f9c08ea74ea616ed4a1975d6"}, {0xc0, 0x119, 0xea2, "9fa3e400d87f84bb9c80c3be9c2bfbcd2af8fe5b1b1b672ff08a33f6488f7fee5632e79f3f5f3e09fd667e40dc04243f591d3123c46b1d18d1cffcbe974d8990758f17eda47568666e80856c91ac83b660aca5dff66977589ab641d43e2a5f853e84aa3bb6d926dd58cc1de3c5821b003600443c1622ab65bc5d862973c8078deb142dcb3f9e69034c65225fa09d5292aaf351f2543fb5c85c37be7d395e01e04710ef1c1c089376219f3a33c1f6"}, {0xc8, 0x108, 0x0, "c68968431b2524d41371704da3c3db8ffbe0c6f1344490c2deb5f981b78d04c0dd11693fe0de21ff089679b4c874d41b4baa70b4aec6269fdcc3f909c64de201d380a17a0890674afa2ae94865f92f90eac6fe25762b93c0b62ed1667baa8d968622fb83b391ece76cb34d47aeeb239a18a9ed1a73166c3ea84438a1f75c145289a7eb4ad6a7643d9ee609a3d05482b3d560cc28e60aa3d0b3a1baad25354c7b24db69e3aa63329bcbce834a18b6dca542c8685970"}, {0xe0, 0x1, 0x6, "ba50eed378243b7b5bf7799607d46e93808b0fef1c9bf2c89d2a876e53fb491ad0d2d95bbdc95348c7cad9707ec648a4034214a0993b6965137a2d8f1e5891429e27ee44a26df6e01fc4626b56356509996c00a5794980394ec54f01a5b86a4f468e3163e3deba6b98f804951fec3f61f865aa14b92e603c1bfb7a8e6c355d73894ff980dbeb0df739e6d3b51de482623d284946215b02c6f8b9ba0228d0c1c185ac174813978ffba509828ef2203a89edc3a6b6e2fb850e5f8a5d1fa547d3e0b56f70383f11794eabb4d8"}, {0xa8, 0x102, 0x2, "61c4f17eb27579f107f4af6fb9714a7cb6d2b8437497a2932daaf1e9fce899050fa5315d94c9299e667fe6cc3075beb0e8f022f61bc9f0a305a854c821cf2eb07c487bd578299d5a73f186654f87ce876a25833e2d427413c863b088505745ec6a4c09a9736fb966e73da03fb983e8dec39aeea397256846f77f6f9a6a44d20a2488f71620099e8178e1cac6f7f329194251"}], 0x500}, 0x40080) [ 1023.716655][T17354] device hsr_slave_0 entered promiscuous mode [ 1023.827078][T17354] device hsr_slave_1 entered promiscuous mode 21:28:13 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffdbd) [ 1023.891048][T17354] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1023.920379][T17354] Cannot create hsr debugfs directory 21:28:13 executing program 3: getpid() syz_clone(0x90800200, &(0x7f0000000000)="892d41d14741a51791c59d08fe3729c6918d614680d7da6a2907a6ebac51bc6573087c572852da5b02", 0x29, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") 21:28:13 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x43, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x3, 0x8, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffff9, '\x00', r0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) [ 1024.311441][ T1151] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:14 executing program 3: getpid() syz_clone(0x90800200, &(0x7f0000000000)="892d41d14741a51791c59d08fe3729c6918d614680d7da6a2907a6ebac51bc6573087c572852da5b02", 0x29, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") (async) syz_clone(0x90800200, &(0x7f0000000000)="892d41d14741a51791c59d08fe3729c6918d614680d7da6a2907a6ebac51bc6573087c572852da5b02", 0x29, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") 21:28:14 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x43, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x3, 0x8, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffff9, '\x00', r0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x43, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x3, 0x8, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffff9, '\x00', r0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) (async) [ 1024.626418][ T1151] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:14 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={r0}) sendmsg(r2, &(0x7f0000000c80)={&(0x7f0000000700)=@rxrpc=@in4={0x21, 0x0, 0x2, 0xfffffffffffffdf5, {0x2, 0x4e24, @multicast2}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000780)="972f7b2a5f50efd74af0a3bb1b8f8dd5c3bbb5885ea72264c4a080e43a4ba9b102a22e8a337e5e568ad9f29b7be2e5d910e66c24c8b7c34533944795499dd573bc62eca143f7140d352f608b3e74fb5eeb55078c3fdfda9a40acf82d47559c662e14890125e1f6dbdb0b87f70344fbeca95baed658a74cfaddc8916b29b7910a294a49f814d7a28b8bb800ad6c31f63c59fa3576453a6601eb48fbfdf78f7ed054e0230a7f3cecaa34a6965181852e77798386", 0xb3}, {&(0x7f0000000cc0)="59e3a7966ee59e99273bbaafd43274bc21ae6b89fcef2e084f6a887e8d6408ccb91cf99e23cdfaf02606da0bebc67e8c0210a1e3178c341dbc15c54b388467e799753c303a924c287c774b9b0549826fe674c5288c35232dd9beeaf7b59357644882edae528835861493efcff43f95819e2c51507673b44d666fc96d816bd69e22ae98db2c4c33bfff06ec316caa3a8346722bdf782c5f80ad0588c48f6f485c23c5eb813e1b8c1ad7ea8d6dc1a09e52331d26e8c631dd81d9d61c69440dcc7e34424f102232568aaf64eeef356445b9b7dd23d2", 0xd4}, {&(0x7f0000000940)="b6901f847173e80687365167017d53361d0fbe611ea76c2314b77a397d2c794d3b480c4265bcaf03a5d2e7a6246290fc5f54ed9390f0c783601521a40136224366ee20a4f0f64bfe487423f75990acb2531fd342c5128d53eca1a490db726fd5c5d2a1b491a385a4870eade6f29146b955662f2ac5f61ceb6a9fe6a4b29d3f30829713a6092703081bd382ad506c3ee4831425ffa0d8c57a4f16d03200b5ee87e9d7a2be94c5223b59321edaedf8a708fdc7b272d8b2b4798412ea8668a67f103057d5251f355b8996a3ca025c", 0xcd}], 0x3, &(0x7f0000000a80)=[{0xc8, 0x88, 0x3f, "8e3c5aab1af09ba543f51f47c1b7f8bda7cc007d8733dc784bf3778c2ad4be1b42ac9d143b64c04a5b14fd1c09ffea716a682829a32a4c817012b7e01a946b81c88cbcc7327bfa1368abe74cfeaef72732ab74ceeaa27721cc66e290f981adf32e1b65d5f84cfe494167496ed05bf3e9366c60dad470186bede80b23a0d300dcf707fddea88f78ce773b58c7baed8cec8cd96aff53962682d89c23c1903142547c4313cbe7cddfb3b074f3f0444e467c13973cd857"}, {0xb0, 0x108, 0xc58d, "4733ed9da38c05e092346c106f55ceb0deadefb1aeaa5b43ae3d6ad402f1792cc5c5138cfdaa5d199b12f94f1bc1faf2a88da8a2702a68b7cb6f0b68f28e9189d67e921e3cea97465307ba211c081671e0bfade06b99828ba0e5ed0848331b814de3f7fd49fab6c916afd96d9a488fdf5c144251f2b6064f81637b2acae997c8a8d6a8b21010df5a1303e07fecbfe319d79f1d0967d5084939801b"}, {0x70, 0x84, 0xfb8b, "c53cd1be156071f0855c3bee7ea6ac0226ad7ec6c8c13a166af4f489ded6ef925af23b025a4b3e1aed66f09775e45f6c7e34260a190526a64760d88b3e879fc89478d866b60d407320d5606fa477f8540666f247b235dba2c7776242b9c63ae4"}], 0x1e8}, 0x801) sendmsg$inet(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="25e0bb10f4fc71fffd24cbc6f2d1dfb2729ca40701e9c1c8a6abc48fa0acbb31b07ecb2f50a4ef9cf100381f58c7a8041dc1da67d2a55b17fb2f8758ab6a", 0x3e}, {&(0x7f00000000c0)="ae5ca1ab1500e3a3e4742a7056f0dc0e669f7bca485f398f3574d4625e665fce109866874a516bce817a1d4439fedabdfdbf4a9581fa7c9ea196205104911358c6d2c54934599f9be4a0d17be58b5b8fb7ed393fc0755d182d1285647671b0dda46e7aea8e491b7b21e40e793be744", 0x6f}, {&(0x7f0000000140)="d8a660736b86a963b0fad3435dcebbae81fda620dae11901016eac52d1405678502230c8880fa60360dccdd98e9853854d28f0a5318e44ac13e37ed69e8f7eccd81684d94d94d6db80918f9f4d853862fe443882656b282fe6101922cec852228d5735a28891c3c1d4c42afaa544fffeea88d8c42bf1ae52b03bf16921a4b9fb2358a27e4a9ff547b845532ea73103589b8457bc511b0c17a1749b969f69939562d9c53f70908554e3cdfa7e455fb965c244da3408d54e145f0be7f79c1765d041b01ab9c2b1cc9fb8d785b109d2294a5746221f0a5eb07920aa6b030731e8f89a1b78fe93f207cca0eb77c3fb68a8bd441ac6", 0xf3}, {&(0x7f0000000240)="e49bc17b09d337cc8d5a0088e0c528036bbb2d2458104bfed3aa44758f35eb62407b8174deb64a7fab14c0e3817714d7adec93c4a86bdb0ffd4dbef0071f583f2018f36c3e23af75a818915717285103d45a3772d6bf4ba6fdd924a20e9bc94a5c930e8335da721d429b1a7b87f5332074176b9e7715a63df4ec5a3ebf3ba90a79bfc4e65cce24114fd6e06b5774ee96c06e62eb2ed057eafb9f32e619ec5d3bc1e4cd9a63b43fbb18184f99bed84dd68c545c2f19d9bc7f24a48a5f4ac53d945c4b47b4acacf1e204c166ab05a2dbb49addb40bc718a81ae39521e59fb6aa", 0xdf}, {&(0x7f0000000340)="f77f808acecbac911cfda2391a3ae609258be9f572b68e89a4af1c5ba27867313cf6db53d1620724888d79ff6a6654b9fe1fe268a14764f4e14bda4c93aa7d8800662232cd49be1e3fc56f0cd48cf961cd8606f10e1152705df43c2013f9777e68784f03fb92fd368d7e6664378552a57d6adeee0154e423031fa133a473e7e3d4725a1a57069ad6808515792272ad0d8de2c693a82dccc398c09b62d74d22768617f04955fdb5440f8b06474a4f0ed99b92bfeb6778979cffd01089033342d452e0c2cc60d6b7d3b6b7bf6680341641765d3ab03a781d165d881b2343760572647552e8a20ea1b1fcbf01d3", 0xec}, {&(0x7f0000000440)="301071af51f1f1e0ef493f6f309489064a19a674e8bd621507edc364ea559f0aa2314bae28bcd224481673baf4552751887dc021895e064cf06369ef8cec27cd4aff367521b38bc7c96862c281d5b87ab3c4e5167e80", 0x56}, {&(0x7f00000004c0)="a4fb049cfd6049366085182c05f793156461e47a6a8505190b38890d23f609ec8bd6f3d0121ac5186adf3c4b6ba3504251535997441c211321863d15bb8eaee5ace4e4c9360f2f14082c82a6192bb0de4b0fba01dc62ee2f826c98111253428ca71938b03a8439b53a2f83cb58534b733516aa5f876a680246d9b66f610f9028f416f9628cd88e7947289f0e735eafdb75c45289b0ddc725c5ac37acce7c133892e47d4f44", 0xa5}], 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="580000000000000000000000070000004434fa71ac1e000100000023ffffffff0000000864010101000000006401010000000edae0000001000000810a01010100000000830f4e0a010101e0000001000000009404000000"], 0x58}, 0x8048800) getpid() 21:28:14 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffffe) [ 1024.875878][ T1151] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:14 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={r0}) sendmsg(r2, &(0x7f0000000c80)={&(0x7f0000000700)=@rxrpc=@in4={0x21, 0x0, 0x2, 0xfffffffffffffdf5, {0x2, 0x4e24, @multicast2}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000780)="972f7b2a5f50efd74af0a3bb1b8f8dd5c3bbb5885ea72264c4a080e43a4ba9b102a22e8a337e5e568ad9f29b7be2e5d910e66c24c8b7c34533944795499dd573bc62eca143f7140d352f608b3e74fb5eeb55078c3fdfda9a40acf82d47559c662e14890125e1f6dbdb0b87f70344fbeca95baed658a74cfaddc8916b29b7910a294a49f814d7a28b8bb800ad6c31f63c59fa3576453a6601eb48fbfdf78f7ed054e0230a7f3cecaa34a6965181852e77798386", 0xb3}, {&(0x7f0000000cc0)="59e3a7966ee59e99273bbaafd43274bc21ae6b89fcef2e084f6a887e8d6408ccb91cf99e23cdfaf02606da0bebc67e8c0210a1e3178c341dbc15c54b388467e799753c303a924c287c774b9b0549826fe674c5288c35232dd9beeaf7b59357644882edae528835861493efcff43f95819e2c51507673b44d666fc96d816bd69e22ae98db2c4c33bfff06ec316caa3a8346722bdf782c5f80ad0588c48f6f485c23c5eb813e1b8c1ad7ea8d6dc1a09e52331d26e8c631dd81d9d61c69440dcc7e34424f102232568aaf64eeef356445b9b7dd23d2", 0xd4}, {&(0x7f0000000940)="b6901f847173e80687365167017d53361d0fbe611ea76c2314b77a397d2c794d3b480c4265bcaf03a5d2e7a6246290fc5f54ed9390f0c783601521a40136224366ee20a4f0f64bfe487423f75990acb2531fd342c5128d53eca1a490db726fd5c5d2a1b491a385a4870eade6f29146b955662f2ac5f61ceb6a9fe6a4b29d3f30829713a6092703081bd382ad506c3ee4831425ffa0d8c57a4f16d03200b5ee87e9d7a2be94c5223b59321edaedf8a708fdc7b272d8b2b4798412ea8668a67f103057d5251f355b8996a3ca025c", 0xcd}], 0x3, &(0x7f0000000a80)=[{0xc8, 0x88, 0x3f, "8e3c5aab1af09ba543f51f47c1b7f8bda7cc007d8733dc784bf3778c2ad4be1b42ac9d143b64c04a5b14fd1c09ffea716a682829a32a4c817012b7e01a946b81c88cbcc7327bfa1368abe74cfeaef72732ab74ceeaa27721cc66e290f981adf32e1b65d5f84cfe494167496ed05bf3e9366c60dad470186bede80b23a0d300dcf707fddea88f78ce773b58c7baed8cec8cd96aff53962682d89c23c1903142547c4313cbe7cddfb3b074f3f0444e467c13973cd857"}, {0xb0, 0x108, 0xc58d, "4733ed9da38c05e092346c106f55ceb0deadefb1aeaa5b43ae3d6ad402f1792cc5c5138cfdaa5d199b12f94f1bc1faf2a88da8a2702a68b7cb6f0b68f28e9189d67e921e3cea97465307ba211c081671e0bfade06b99828ba0e5ed0848331b814de3f7fd49fab6c916afd96d9a488fdf5c144251f2b6064f81637b2acae997c8a8d6a8b21010df5a1303e07fecbfe319d79f1d0967d5084939801b"}, {0x70, 0x84, 0xfb8b, "c53cd1be156071f0855c3bee7ea6ac0226ad7ec6c8c13a166af4f489ded6ef925af23b025a4b3e1aed66f09775e45f6c7e34260a190526a64760d88b3e879fc89478d866b60d407320d5606fa477f8540666f247b235dba2c7776242b9c63ae4"}], 0x1e8}, 0x801) sendmsg$inet(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="25e0bb10f4fc71fffd24cbc6f2d1dfb2729ca40701e9c1c8a6abc48fa0acbb31b07ecb2f50a4ef9cf100381f58c7a8041dc1da67d2a55b17fb2f8758ab6a", 0x3e}, {&(0x7f00000000c0)="ae5ca1ab1500e3a3e4742a7056f0dc0e669f7bca485f398f3574d4625e665fce109866874a516bce817a1d4439fedabdfdbf4a9581fa7c9ea196205104911358c6d2c54934599f9be4a0d17be58b5b8fb7ed393fc0755d182d1285647671b0dda46e7aea8e491b7b21e40e793be744", 0x6f}, {&(0x7f0000000140)="d8a660736b86a963b0fad3435dcebbae81fda620dae11901016eac52d1405678502230c8880fa60360dccdd98e9853854d28f0a5318e44ac13e37ed69e8f7eccd81684d94d94d6db80918f9f4d853862fe443882656b282fe6101922cec852228d5735a28891c3c1d4c42afaa544fffeea88d8c42bf1ae52b03bf16921a4b9fb2358a27e4a9ff547b845532ea73103589b8457bc511b0c17a1749b969f69939562d9c53f70908554e3cdfa7e455fb965c244da3408d54e145f0be7f79c1765d041b01ab9c2b1cc9fb8d785b109d2294a5746221f0a5eb07920aa6b030731e8f89a1b78fe93f207cca0eb77c3fb68a8bd441ac6", 0xf3}, {&(0x7f0000000240)="e49bc17b09d337cc8d5a0088e0c528036bbb2d2458104bfed3aa44758f35eb62407b8174deb64a7fab14c0e3817714d7adec93c4a86bdb0ffd4dbef0071f583f2018f36c3e23af75a818915717285103d45a3772d6bf4ba6fdd924a20e9bc94a5c930e8335da721d429b1a7b87f5332074176b9e7715a63df4ec5a3ebf3ba90a79bfc4e65cce24114fd6e06b5774ee96c06e62eb2ed057eafb9f32e619ec5d3bc1e4cd9a63b43fbb18184f99bed84dd68c545c2f19d9bc7f24a48a5f4ac53d945c4b47b4acacf1e204c166ab05a2dbb49addb40bc718a81ae39521e59fb6aa", 0xdf}, {&(0x7f0000000340)="f77f808acecbac911cfda2391a3ae609258be9f572b68e89a4af1c5ba27867313cf6db53d1620724888d79ff6a6654b9fe1fe268a14764f4e14bda4c93aa7d8800662232cd49be1e3fc56f0cd48cf961cd8606f10e1152705df43c2013f9777e68784f03fb92fd368d7e6664378552a57d6adeee0154e423031fa133a473e7e3d4725a1a57069ad6808515792272ad0d8de2c693a82dccc398c09b62d74d22768617f04955fdb5440f8b06474a4f0ed99b92bfeb6778979cffd01089033342d452e0c2cc60d6b7d3b6b7bf6680341641765d3ab03a781d165d881b2343760572647552e8a20ea1b1fcbf01d3", 0xec}, {&(0x7f0000000440)="301071af51f1f1e0ef493f6f309489064a19a674e8bd621507edc364ea559f0aa2314bae28bcd224481673baf4552751887dc021895e064cf06369ef8cec27cd4aff367521b38bc7c96862c281d5b87ab3c4e5167e80", 0x56}, {&(0x7f00000004c0)="a4fb049cfd6049366085182c05f793156461e47a6a8505190b38890d23f609ec8bd6f3d0121ac5186adf3c4b6ba3504251535997441c211321863d15bb8eaee5ace4e4c9360f2f14082c82a6192bb0de4b0fba01dc62ee2f826c98111253428ca71938b03a8439b53a2f83cb58534b733516aa5f876a680246d9b66f610f9028f416f9628cd88e7947289f0e735eafdb75c45289b0ddc725c5ac37acce7c133892e47d4f44", 0xa5}], 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="580000000000000000000000070000004434fa71ac1e000100000023ffffffff0000000864010101000000006401010000000edae0000001000000810a01010100000000830f4e0a010101e0000001000000009404000000"], 0x58}, 0x8048800) (async, rerun: 32) getpid() (rerun: 32) 21:28:15 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffffe) 21:28:15 executing program 3: bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) getpid() [ 1025.487122][T15707] Bluetooth: hci0: command 0x0419 tx timeout [ 1025.570456][T15704] Bluetooth: hci2: command 0x0419 tx timeout [ 1025.576555][T15704] Bluetooth: hci1: command 0x0419 tx timeout [ 1025.615605][T17345] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:15 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2, 0x0}, 0x8) r2 = syz_clone(0x1160600, &(0x7f0000000100)="602467f5fbbc6cc542967a2c30207d057e884dcd0957f135ea9e331f70ca1ee49f809be11b03a0544e36204ba79540dd1a383432ed1bd4c66ab6ea7fa3747e0de8388d137579eecd437e92e04125d06b5e59183aadef99feae390ccfbfe1b6ff05ed3e751030363d50f04cc25bb6401e1c9054e66d978383ec56eaa20d8e1d323a8748920d7cea4e147ffe4f683fa3e911c7891c09df233880500f709433dad8aca2ba8d2a0754da7b", 0xa9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="d177bda63d2c5897c63f4e7666b4e2a486eae086a6ed4bf3b1e44211ca3e855c583d4f96758c821af9650cb32a7404b400d02822f5c5604ab5ea7f3cb08abea12009") r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x5, 0x4, 0xf3, 0x0, 0x2, 0x40080, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x74, 0x6, @perf_bp={&(0x7f0000000040)}, 0x68, 0x80, 0x8b0, 0x1, 0x2, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x2}, r2, 0x0, r3, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r5}, 0x18) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=ANY=[@ANYBLOB="180000000100000000000000ff0300002892f209000000007d56ffffedffffff8c3a3000f0ffffff850000005e00000018190000", @ANYRES32=0x1, @ANYBLOB="000000000000000200110010", @ANYRES32, @ANYBLOB="0000000000000000b708000091ed00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r6, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r7}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r6, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x0, '\x00', r10, r11, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r7, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r6, r8, r9], 0x0, 0x10, 0x5}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x100, '\x00', r10, r11, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r6}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r13}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r10, 0x27, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r14, r7, 0x6, &(0x7f000000bf80)=[r8, r9, r12], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x18, &(0x7f0000000700)=@raw=[@alu={0x7, 0x1, 0x8, 0x2, 0x8, 0xffffffffffffffc0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x80000000}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xd, 0x5, 0x1, 0x0, 0x1}], &(0x7f00000007c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000800)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0x8, 0x2, 0x7ff}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r3, r5, r4, r4, r6, r3, r4, r6, r4], 0x0, 0x10, 0x7f}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x3, &(0x7f00000008c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x2, &(0x7f0000000a80)=""/2, 0x40f00, 0x25, '\x00', r10, 0x25, r11, 0x8, &(0x7f0000000ac0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x0, 0x6, 0x5}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000b40)=[{0x3, 0x5, 0x7, 0x4}, {0x1, 0x2, 0x4, 0x9}, {0x5, 0x4, 0x6}, {0x0, 0x5, 0x8, 0x2}, {0x5, 0x3, 0x0, 0x6}, {0x1, 0x3, 0xc, 0x2}], 0x10, 0x90b4}, 0x90) sendmsg$kcm(r3, &(0x7f00000006c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)="7231698725f56a6dea0705ec1320e1e0e7cd80f6214246bac7b72e5f9d74fca7c7d87624b9b4c23ff183508e71bddfedd7eea23c57c7cb351ade97d0a9023ffb39fd5c0964d42a95176901c5825e56a5c5e898ebcd5ef8593b87c405c4ad8c01087e282087e720145bc28672ed26450e3facd0250e8c1ffe8e9f81fb9e487ec0ce88b34f7ee21af5969bd69c85d41771590265d5edc36dc0a4fdb8607751fc48f47c723e70365e54f281b6a51bf1cada974ebe8b7848", 0xb6}, {&(0x7f0000000400)="7b2c613dfb7c0a16d1a22050c853b424ace9340b4267898a8dae1f086f2c7f8ffa7a744cebe7efc323112307ba72c1916f7a11ef3abb5b61ee363e87890740932725989309cffe10ebc909679127426d3297fac5835ea58a8b9d7fccc8c907b9c22ed82d46f993d55212e6fac9c0f31ab188713c12c37589f7269f5f2a3f4f4b43f5a03d24b2dadb990c8f153c6f68b225edc083ce942f3ef0b7f31ab88484ac6a7e736c56766444050ad54449b09f5764e8e81120b308c1ec19c15372f336cd66af57fbf05b2622", 0xc8}, {&(0x7f0000000500)="68fb14f01974fb6fbb9b3213dd340276b38ade791737e6b5a21c296bd66af8182b8b71ca7e55e6eb56368703b46dc72d06edcbe18def07280885aa8bca35b65e5f8325dda9b150355aa071c76fcfdaf8b72b65897e0c084846c79b99c6", 0x5d}, {&(0x7f00000005c0)="2c7e5f3fb9b2c141b3f3be5acf4cc57fb0bf6a23c1b56507faa663c23e3057849265e832b1f5b577f4360a26d974999e10b25f6f6e2515e24129a47c497f210e1499b76bad5e8d8a950cacf0b595db3aec7f0d1fbc7e3dae034ea75d96016651e2d3d1fcc8746a2d5aa1c127783eda376527ae2b7aa71ec92cb5840660a777dde984256e8cb15792944e365d32c4fb2c188a04775685c4865c0ec77be03711d27616b1e4ba1ef42115dbde", 0xab}], 0x4}, 0x8000) [ 1025.715453][ T1151] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.740254][T15704] Bluetooth: hci3: command 0x0419 tx timeout [ 1025.777698][T17345] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.809128][ T1151] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:15 executing program 3: bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async) getpid() [ 1025.868285][T17345] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.984386][ T1151] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.030497][T17345] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.077970][ T1151] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 21:28:15 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2, 0x0}, 0x8) (async, rerun: 64) r2 = syz_clone(0x1160600, &(0x7f0000000100)="602467f5fbbc6cc542967a2c30207d057e884dcd0957f135ea9e331f70ca1ee49f809be11b03a0544e36204ba79540dd1a383432ed1bd4c66ab6ea7fa3747e0de8388d137579eecd437e92e04125d06b5e59183aadef99feae390ccfbfe1b6ff05ed3e751030363d50f04cc25bb6401e1c9054e66d978383ec56eaa20d8e1d323a8748920d7cea4e147ffe4f683fa3e911c7891c09df233880500f709433dad8aca2ba8d2a0754da7b", 0xa9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="d177bda63d2c5897c63f4e7666b4e2a486eae086a6ed4bf3b1e44211ca3e855c583d4f96758c821af9650cb32a7404b400d02822f5c5604ab5ea7f3cb08abea12009") r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) (async, rerun: 64) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x5, 0x4, 0xf3, 0x0, 0x2, 0x40080, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x74, 0x6, @perf_bp={&(0x7f0000000040)}, 0x68, 0x80, 0x8b0, 0x1, 0x2, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x2}, r2, 0x0, r3, 0x0) (rerun: 64) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r5}, 0x18) (async, rerun: 64) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) (async, rerun: 64) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=ANY=[@ANYBLOB="180000000100000000000000ff0300002892f209000000007d56ffffedffffff8c3a3000f0ffffff850000005e00000018190000", @ANYRES32=0x1, @ANYBLOB="000000000000000200110010", @ANYRES32, @ANYBLOB="0000000000000000b708000091ed00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r6, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r7}, 0x20) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r6, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x0, '\x00', r10, r11, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r7, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r6, r8, r9], 0x0, 0x10, 0x5}, 0x90) (async, rerun: 64) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x100, '\x00', r10, r11, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r6}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r13}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r10, 0x27, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r14, r7, 0x6, &(0x7f000000bf80)=[r8, r9, r12], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1a, 0x18, &(0x7f0000000700)=@raw=[@alu={0x7, 0x1, 0x8, 0x2, 0x8, 0xffffffffffffffc0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x80000000}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xd, 0x5, 0x1, 0x0, 0x1}], &(0x7f00000007c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000800)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0x8, 0x2, 0x7ff}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r3, r5, r4, r4, r6, r3, r4, r6, r4], 0x0, 0x10, 0x7f}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x3, &(0x7f00000008c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x2, &(0x7f0000000a80)=""/2, 0x40f00, 0x25, '\x00', r10, 0x25, r11, 0x8, &(0x7f0000000ac0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x0, 0x6, 0x5}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000b40)=[{0x3, 0x5, 0x7, 0x4}, {0x1, 0x2, 0x4, 0x9}, {0x5, 0x4, 0x6}, {0x0, 0x5, 0x8, 0x2}, {0x5, 0x3, 0x0, 0x6}, {0x1, 0x3, 0xc, 0x2}], 0x10, 0x90b4}, 0x90) (async) sendmsg$kcm(r3, &(0x7f00000006c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)="7231698725f56a6dea0705ec1320e1e0e7cd80f6214246bac7b72e5f9d74fca7c7d87624b9b4c23ff183508e71bddfedd7eea23c57c7cb351ade97d0a9023ffb39fd5c0964d42a95176901c5825e56a5c5e898ebcd5ef8593b87c405c4ad8c01087e282087e720145bc28672ed26450e3facd0250e8c1ffe8e9f81fb9e487ec0ce88b34f7ee21af5969bd69c85d41771590265d5edc36dc0a4fdb8607751fc48f47c723e70365e54f281b6a51bf1cada974ebe8b7848", 0xb6}, {&(0x7f0000000400)="7b2c613dfb7c0a16d1a22050c853b424ace9340b4267898a8dae1f086f2c7f8ffa7a744cebe7efc323112307ba72c1916f7a11ef3abb5b61ee363e87890740932725989309cffe10ebc909679127426d3297fac5835ea58a8b9d7fccc8c907b9c22ed82d46f993d55212e6fac9c0f31ab188713c12c37589f7269f5f2a3f4f4b43f5a03d24b2dadb990c8f153c6f68b225edc083ce942f3ef0b7f31ab88484ac6a7e736c56766444050ad54449b09f5764e8e81120b308c1ec19c15372f336cd66af57fbf05b2622", 0xc8}, {&(0x7f0000000500)="68fb14f01974fb6fbb9b3213dd340276b38ade791737e6b5a21c296bd66af8182b8b71ca7e55e6eb56368703b46dc72d06edcbe18def07280885aa8bca35b65e5f8325dda9b150355aa071c76fcfdaf8b72b65897e0c084846c79b99c6", 0x5d}, {&(0x7f00000005c0)="2c7e5f3fb9b2c141b3f3be5acf4cc57fb0bf6a23c1b56507faa663c23e3057849265e832b1f5b577f4360a26d974999e10b25f6f6e2515e24129a47c497f210e1499b76bad5e8d8a950cacf0b595db3aec7f0d1fbc7e3dae034ea75d96016651e2d3d1fcc8746a2d5aa1c127783eda376527ae2b7aa71ec92cb5840660a777dde984256e8cb15792944e365d32c4fb2c188a04775685c4865c0ec77be03711d27616b1e4ba1ef42115dbde", 0xab}], 0x4}, 0x8000) 21:28:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001600)={&(0x7f0000000040), 0x6e, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000100)=""/216, 0xd8}, {&(0x7f0000000200)=""/209, 0xd1}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/108, 0x6c}, {&(0x7f0000001380)=""/187, 0xbb}, {&(0x7f0000001440)=""/211, 0xd3}], 0x7, &(0x7f00000015c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x11100) getpid() r2 = getpid() syz_clone(0x104880, &(0x7f0000001640)="0e291a8f33c73bc24c5df44f0af178d97daceee1112a843a0ad3dc665d358457146ab275ad5545a697037cc2b602111ee92ef1eade40b675649c95b60926c673038e16137096e77a59425c315e1b765c58b58ed41049be81a5f12117994a426b06821ce338bf1e1ea1d6ede6c9b0f95029b41310af12dfe3502bc4eadbb8342ab99f99359b7edfd5a79e0ee112bac0c688c54cc4f80c", 0x96, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="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") perf_event_open(&(0x7f0000002780)={0x1, 0x80, 0x1f, 0x7, 0x1c, 0x7, 0x0, 0x7, 0x810c0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x7fff, 0xfc50}, 0x8, 0x7bd6, 0x3, 0x3, 0x8, 0x401, 0x7124, 0x0, 0x80000000}, r2, 0x9, r1, 0x2) [ 1026.502801][ T1151] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.583236][ T1151] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.818481][ T1151] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.914582][ T1151] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1027.141286][T17345] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1027.163808][T17345] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1027.265450][T17345] netdevsim netdevsim2 netdevsim2: renamed from eth2 21:28:16 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r6, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r1}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000540)=r2, 0x4) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7, '\x00', r4, r5, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0xe, &(0x7f0000000140)=@raw=[@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8f}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x89}], &(0x7f00000001c0)='GPL\x00', 0x7af, 0x37, &(0x7f0000000200)=""/55, 0x41100, 0x24, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r3, r8, r9], &(0x7f0000000400)=[{0x2, 0x3, 0x4, 0x3}, {0x2, 0x2, 0x10, 0xb}, {0x3, 0x1, 0x9, 0x7}, {0x0, 0x2, 0x6, 0x6}, {0x4, 0x2, 0xf, 0x8}, {0x4, 0x4, 0xe, 0xb}, {0x4, 0x5, 0x4, 0x3}], 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r11, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c380)={&(0x7f000000c200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x1, [{0xa, 0x1, 0x80000001}]}, @struct={0x3, 0x4, 0x0, 0x4, 0x0, 0x80000000, [{0x6, 0x1, 0x8}, {0x6, 0x3, 0x3}, {0x3, 0x1, 0xd1c1}, {0xe, 0x2, 0x1}]}, @union={0xf, 0x1, 0x0, 0x5, 0x1, 0x6, [{0xb, 0x2, 0x5cb}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0x1, 0x3}, {0xd}, {0x1}, {0x4, 0x5}, {0x8, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x5f, 0x30, 0x30, 0x30, 0x3, 0x0, 0x71, 0x5f]}}, &(0x7f000000c300)=""/106, 0xe2, 0x6a, 0x0, 0x10001}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000c3c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r4, r12, 0x1, 0x5, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xffffffff, 0x101, 0x2000, 0x1, 0x3, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0x2}, 0x48) [ 1027.310882][T17345] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1027.519801][T17345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1027.535249][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1027.543497][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1027.554373][T17345] 8021q: adding VLAN 0 to HW filter on device team0 [ 1027.565955][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1027.575478][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1027.586643][T32104] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.593753][T32104] bridge0: port 1(bridge_slave_0) entered forwarding state 21:28:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001600)={&(0x7f0000000040), 0x6e, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000100)=""/216, 0xd8}, {&(0x7f0000000200)=""/209, 0xd1}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/108, 0x6c}, {&(0x7f0000001380)=""/187, 0xbb}, {&(0x7f0000001440)=""/211, 0xd3}], 0x7, &(0x7f00000015c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x11100) getpid() (async) r2 = getpid() syz_clone(0x104880, &(0x7f0000001640)="0e291a8f33c73bc24c5df44f0af178d97daceee1112a843a0ad3dc665d358457146ab275ad5545a697037cc2b602111ee92ef1eade40b675649c95b60926c673038e16137096e77a59425c315e1b765c58b58ed41049be81a5f12117994a426b06821ce338bf1e1ea1d6ede6c9b0f95029b41310af12dfe3502bc4eadbb8342ab99f99359b7edfd5a79e0ee112bac0c688c54cc4f80c", 0x96, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="f290fcff3fcd09a7031a4e0ba8eec6e7b78dd28075b198f5d982339263c9e833ee9c9cddfe62fafa14a9fa87481ec3f54247027a4842f082d54b4b6a1017d0746afb4fa706b9706da1e892a2931433164a424777b521d032702eb8565a92d9dfddfff18d200c18b969bb2ffb57c84e4553a74d698c9e259bfa4ee1a8a65ccfe99535f8fac10d982d3cc50827ce34c09cf21536a31e9fa3490f89efa6385c9d52fe26312cdc0881f79ac087f3c78644f7a9baeaa6b332e7a8edb28ea04f4f618c96b279f0564abc3e847cd1089ee67e2481ddd51c008166f40d6894fb0d9d4883f00d762ebf18ebee2a7aa30769c1261a5744cdf3368404ddb422026f774b8cfd7a6047e1cadf8eecf30b58e56310037e3d8609d466f5db4a1b23efaf7a4c65bf3cbdf4c5c828e77398a0fa96d41d90221822ea5e769bb9ede97bb02aeafe391bc27620ff662a0794f8869aefad6247d03f27e6a06d9af1a3efccddd0f488db7c9a853be5786e21faa7b0cf0603f2c14ab27cf2aa477fda8dc6535fc1b96c7860dcbc7f3a8b5e95c2f6b3b04e1dd6178ccf6838c0f102e9bbac515b72fdcae3f0ea1aaf96785e67445ac3735716606f2d382353aeb40c9bbe9477db65a9c686e38af12a80b4dc4d76dcb5ed50edad44b197882b536d02389e4fae010b1272c2e581b7612c306a33dca162ae3a92101a0b39f21e9518ee0ad6cd6b31196c0657dd247d0a40f6c59a174e4b0a7cc8b9a8be5b96d7a3397f6d62fc3ccad98a55311b1888c875dae912be83da420e50513a4c88ecb744ee7c3bf723ab80dde600e27afdd05714181635ee89675a85d2880d1b2e7c36e6872b77cb8c055d6b6b8dd739613b26256e7742f4bd3ed885beba6f930a6c06b1971163fb7dda4233d0eb25afe74f5af10d4279ee36c0dba7e07d61bba8df37c77c7ce16a0d411dc165ee4b81881e0f3f79616f8aa43ff3ef8730e12d32319265b74891d872121acdeaf03f4c2d29b173bbccc60479c372332df80cd98ad75ab71fd97747c4be5d94acbc97d9e68f82ec600630746358d6d040d20eb5fab85a7fccd4b443659108e6972f6218316a1ffa9d99e6a497545ef8a0b0fd00970e24bd73dd6e88cadceb5acc2a463f70d5862dedf6bef2dfce4469bf0979b2f8eda4c8f641dd1f2717d54fab99d52a59ff1a775dda6b6672c7b2ea9e0d1a39bfcbc48e991df3ea118bd6d1d15f85887c755d00c615176ad7e5eac17b6f0c14c06a0f8d1b49c15d17aded53d2247aab50fe32ced97e85fc9b77711750600e3ed1d1aed08cc62f626ae7ebc5a619992431c8de9df28411d9f0a831cb24adbe8aa86ebf7dd96a055f56820fe77763ad7bb26e170bd3d943388841181dbfab3af2c920d3f9f3955a8c57d9842c9fa658e9960a11e616b49c6dfb750c7b6bc44967411f4f73ef49c1dcc6becbd39b23c2f9d0aa4ed3dd34180e06d9e81f46065d9a3c8419d30739577a1c73b908bf269487f2c28fd89ac0534a3eb82dd80810dcddc79c29f43026940ea1e1da56db82eefb6a5a1ad5332a1d7f81d552685fc6a40f1c7894336667b038d1a3e01ff0f6ea3eb6ca0bba53343542351c089f8b7a1de11e53199780347814a6a2be7416ac8b249c88dfea762d08443759bb3ea40c7002980842214b1576a9a71c54571732da0c0f29e6c7e6c1b5b8cac56dbd4db334c7a167af65c969509edf4e139d58fbe61fc5cf942df41b5ec29d2f07cda2e7f6b7e8b91faf1d37d4c013cb74e909e55a21412311e03b6d84914d338164a9016101c8cdd28e63f71faaaf18377269b646d186515fc9d55fd3661bbaae52047c51f52a620f051c6e0d8b2020a7d20f86538bc4edf8d59fcd3dd13d8ea6e700cc001f5f4d7aaeb2110818089c4cd9949fe9c36c498889fa609af86677b11b29ea37e9b4c5d9e6aae86d83108abcea97c1ded57a3b7232cc4c0c478d2f9c81d0edf7824ddb877e98c2bd001e2076d5cad2b98eb7a581068e3e2658e3ea0b7e7e8f5f84114151d52c544d2f5c0da867d77a36c901b37fa0fbb77be8705a06f364326b99d7d3b780e4daacc744a1973e1cd33cb03dff68757be1d32783c90f8e0c650fa78ad55db077b67876708a82d9f21c9347b51a87f92ea233703884e3c54917232cf3eff49da76acfef7838f9277e432592c9a66ac41275d11052e1e35b202840ee4045cf3833dabe2ae82ba225b5b1f70463426de2df60a795cc393e677d4a781dab98e6ec6bf95a95abc2bb458d59b5962a703490634e7f038e1517b89ede062be3bcbd78d3bc3d61b6314a4c3eebe307940298b71bc2f6745df8aa03f1f55c1b5a930e7a6b24c728ba46385ca86475e944dcb3223eec0cfbb84cf97ee5a6af802ae099b22c234cc839be41e6006c8bc9de2c1785004ad3cf04af75082d7b89524196e6e507acf04d8c5179f6e94f702263e38e0bb41a1ce1e34d4022b93ab45a045697e8aaf3f57aca423e263a988aac2f69c0d3de7ffbb0cf2bc927e5621f2b4ff83cd30ea44cdb8c8cdcfaf724243255dab6db5f5d239ab4e5f646dbb20bc6fa790c332d6214b05e657e3c56074806bed573c354929d5c5af0f8450dab68e0bd83f18a1ab321bb614122474cd86cb940bd792259ef8aa7c82c276546ee5a7e63fcff978882f82f1cc588816ee4b08c7d428592d7a723581b65844fc98fe00e6aa308b425284e179404caba89458120085269ae47a8f604b6612e3829a884d436bf8b65344704159705268e1ecf6a1ccab3699412c71bb33fead96ad038553f8eb713c16d6dcee359c19a0dca0c50038eb4c8b33214f37d7c29d349e4e0d1befdeb6126cd711a3b015a220bf472c96cff855d2527d14cd965d5c0bcb69a1c9cee813fec272bae58be7892a0a11c2c21decf98378a8a8cbd35937f402c63befc060d5a9bb60b24683b4b24131a176348c663ef8714018a977a6ef48aa266aed2db1b85ea7acc080de6dccaeb62a0f21efb447c1f2d4d24594044076c5f700560a9355b208d29de03e0c254a5a86c812424cec0110d5a924b10ff21a8a9aed3f0d24c7bb96c95d20b83be8b3900c1934450d886e714cdbe1a51d26b480501622db9ef3fd4a8a13ea1c771a6bb91df3eae456a50eeb4b44a932aaebdc46c25fb4dd8882b3d514f29d1e48a371756b440ea42276e2e8364e12bdb04c48b032627ab979d2e34d7f93caec4b4857bad5aca169ab10ea013da6cd388fbd808b2a4f3f34c99378a4874998597a6bcc0284163fac805063f36fbfbb3073380c01c2a6f6eb7c5b4a0e37ad7190eae8a69909d8621df94180eb5d3ed08b57c6edd4ecf71679f5d4b997b0a7c54dab9942f232c13dd3b9bef6469757dd838b003b04d81cc421637178bc37928b0e51c3fff9083a35b3a6011bb7eb0c393e8d6093058b3337c9d3002ee74210bf1b18e3c78aff2b591c64510cf4c09f12cfc7c0398e569a150c74162a19b3588205c741ab82171bba3ea321198c4334906ceeed7eda9eb5da2aa4402d971ade36659b2302ca81cb279905e1a02e574a8453769d900a737c2aa8d4bdb9457d17c762fa6be4dd184472ffe004c76ddcdfef30ff2edaf23322e01d5261742e718ef04d9ae89f7d71cc0bda7b62d4a516328d97070118cf87e81f2b2dbc674ad05de5474a2414bcc6d2efd238078e7b4d7f75442e2f76f49615b840d40bbe580d00fef62d787634f173b71edfd82736ac7e3e12a9a754bc93fc8015f7a88179017cd3b51cb50a4cc7aa2aa11af6fa21550375e44655d6c624e80a96894fbc7c7a218fede0dea2347bbfcf9df8cb817f0ffb98660a519dedf5dc490ad4c2f8a9c5516d808c6676539d8879d95446190eebf8ec86463e0792827d265d945529ec1a3362ac822937f592b1082706b56103304f8f4667a5ad9db7b0d84c60b178798b7802c03c2a2dac13b7b12821432f06115eccd499befc34f33b1001f3dd4f4181b6ec565b6ad7e8e61e0746c2614cbf632ab1ab39772f51dd36a9845d3f37e9a7b350d63a78867413869c41a210a4ad88e30b959382d4471f318c59b52b44fe0f086bc09c85da5c91478f6351ce1cebfeda497ea3bdf3a07420b870a2587cbe8034c7b88e65b9e8c2d3a910666babf128bcad56fd28c6ccf3be85a6fc650521cec6a450cceceed09e9705f3d81a3b19ab4abce7b4dea38f2b9229c562b2533216c54933ff5d43d0bf23b002c9cb09800192e4f880c77b5e7051b9dd4adcf250a177074e4a46271fdcb830cc5ea00d14f84361f00d152eb338ca7adb27259ca313ff5a983a3f309cc900dd3cad6da64918ae47ca9065a8843638c4354e5b5ce26ea364942635311350bd69b3231d5982762213cb43ca3576aec048bb86fff8678da9804cce3c31a12cf4cfaf660d5d8f242c06c763da82f9e03e3f60ff5b5611c540560601786fec9b92316c5e7c9911ddfe496aef67780d7f8154e1c4c5ec8e6aef17d457333b757c700b23d376fd92e10ddbdeb9973541d0e20ed6ccdda67c4f0e03f77b01d58d9fd390cdae8ad042a1441ac28043d184f656d7ea0f9662381aaa30da603b03a4f2e2a0f99d89f90fb054d7e2db4409e7cd4f49a7bb5b441b0ce557f1bd9b0433089b02c4d434fe5764175b4d94210c5bf7d75eca0c0b2c7736883152cebf59aa73085873a6b894acaeac5564f9d81d2679021ba1ff96176b9a863ec43116c9361ca002188b575a48eb4b39aad23dd7c380770afe185d0963b5e8cea5f47bbfd837b6e74f70e7f328a70cfff7e27bd9e961f5312060ee76e90726fc32f19176a6a1a15650b42e6177709224efb4fdbd6327ab942539adce1ac8ba4494d5c7505e2b86c8174311755fb91c8a414b769508ac160468531b60a54641e40657301b48d86d23a0e7617b3f6f5aa3978a5f58f4bf2c3d55e8e378ef5b1d04a7485a9062cc75ba39a81c8261025418d49863db77d5ab6353521a387944880d6658853cdcbb765fb013575c7cc7ba3c452a746807f19e320f29d966bd2e0878283a72f1aaf2fddb36d43724d7c1f36fe621723e854c9cddcb25f9fabb61e7e044b24da8dc5a2904e57d0926190e7f7ebf8bac753997c68d4cf58da7fbcfe29983e1094db48bc13369ae1561f1b727d8dbcb233ef8a2b2821e751d9b0727f1a52a27231892fa3f31de9e07278f874ef18ca89a15bcdf75e694ac0100c02ad5264b24f6010e20916ec7329330343cec85885f1b4e0f1e64424f073b7903093969587d7d27b1fd7bc57a65b0aa84c14d1947e0da3a0b7707de230c4d83308fb550a51ffa4be486f0889bd271f546dda477f40ec0581fe411578f0f94aaed502a386017c3d947f7e0df36ca4fad29871056c6fd8dc70dbeca4d1c8db9c39b7adba1b756fff207db925bd08a0a2c180138daf86c0bf7e7f1cae7eacd467f3f71f2ddd01125173167fd966b451f09ab1039dacb88cc25761b93c0b030c11422fe56713c5a9fef7dd49a8b5181e3d50c131b302da4fd55459bda8b4f74ca9ca889e87aa78b24ddb1f10b2628c719ba39b37d569f024449819505d13174a572b205c613329361d0325cd18e61fc0659ec1b548008890cb991753b8f87144bf6f61cfb928a041ee375b5f5b3b336fa64100ff9315bd4476689b73e9c3658eca9a1bbcd800ad95780ebbcdd6882416dc503d2a4a505a2cd6d73902b15c239909cce0122394dcb5f2e83a6ac28aa9084e45409ea6b73d6bccc856e0c4932522af4f37b6b26adf718d6af7ae26b348e08f932e62e633c16bff4b12408f844c3f2e9872515d01342fc7eb45dbc048") perf_event_open(&(0x7f0000002780)={0x1, 0x80, 0x1f, 0x7, 0x1c, 0x7, 0x0, 0x7, 0x810c0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x7fff, 0xfc50}, 0x8, 0x7bd6, 0x3, 0x3, 0x8, 0x401, 0x7124, 0x0, 0x80000000}, r2, 0x9, r1, 0x2) [ 1027.630450][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1027.638505][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1027.658287][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1027.684019][T32104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.691157][T32104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1027.706340][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1027.731141][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1027.778477][T17345] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1027.795339][T17345] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1027.809672][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1027.820055][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:28:17 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r6, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r1}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000540)=r2, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7, '\x00', r4, r5, 0x3, 0x1, 0x4}, 0x48) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7, '\x00', r4, r5, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0xe, &(0x7f0000000140)=@raw=[@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8f}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x89}], &(0x7f00000001c0)='GPL\x00', 0x7af, 0x37, &(0x7f0000000200)=""/55, 0x41100, 0x24, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r3, r8, r9], &(0x7f0000000400)=[{0x2, 0x3, 0x4, 0x3}, {0x2, 0x2, 0x10, 0xb}, {0x3, 0x1, 0x9, 0x7}, {0x0, 0x2, 0x6, 0x6}, {0x4, 0x2, 0xf, 0x8}, {0x4, 0x4, 0xe, 0xb}, {0x4, 0x5, 0x4, 0x3}], 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) (async) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r11, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c380)={&(0x7f000000c200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x1, [{0xa, 0x1, 0x80000001}]}, @struct={0x3, 0x4, 0x0, 0x4, 0x0, 0x80000000, [{0x6, 0x1, 0x8}, {0x6, 0x3, 0x3}, {0x3, 0x1, 0xd1c1}, {0xe, 0x2, 0x1}]}, @union={0xf, 0x1, 0x0, 0x5, 0x1, 0x6, [{0xb, 0x2, 0x5cb}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0x1, 0x3}, {0xd}, {0x1}, {0x4, 0x5}, {0x8, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x5f, 0x30, 0x30, 0x30, 0x3, 0x0, 0x71, 0x5f]}}, &(0x7f000000c300)=""/106, 0xe2, 0x6a, 0x0, 0x10001}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000c3c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r4, r12, 0x1, 0x5, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0xffffffff, 0x101, 0x2000, 0x1, 0x3, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0x2}, 0x48) [ 1027.829694][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1027.838944][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1027.848267][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1027.857403][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1027.869987][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1027.890933][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1027.899398][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1027.915114][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:28:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000000c0)="5e140f5e376b74d7cb00cdae56e875f7dd017140ff645aaade17b670c159b21365364606019e2c1eae671b8583291813bcffb6b4503488a180a0b31030b93ef6415f25022c919d793d0d7c3c57e271f5cfd3cc205e239c995ea144d4a22ea6db008ddc9bae3941417f00b9290c26af5ffe3747caee9348b64e5e8073", 0x7c}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="b605d81ed258cdb429ab63f326c819bf5967dd84270fa79941cf42c4d5a376", 0x1f}, {&(0x7f0000002180)="24728ed563c437953ac99e6b4081d0a7a095fcaed990a56c38a533c2b5a3d1a622cab41b7b025246a9cf042819896d8377ccbd3c36bf325d40dc134e402f30e74d1782208b1409a1cdb35c4d697fb62a28e128c0ccfc33304c8e2910fdb99afc4e7268d7bef177e3b97a4c8f12ac99212d7a99b67c46c8e5cca6fbbb08", 0x7d}], 0x5, &(0x7f0000002280)=[{0x98, 0x104, 0x5, "843c2a6563a9eaf38507e8b9c5be436f17dec671f8c21659beade2348956a57be686c9caad6cd6bc2b56017ff6f4cf2b0897f371afbc7a48739f62bf581a2837e1875a2fd876dfc7fd47ed85095abbd47b68c375d25b7dfd83f8ab2a179a9c07e87acfe345805b813f5ec264b842adf7c244ef1c7f311579d7ababbcef71b54cfa4c3dbc"}, {0xb8, 0x10d, 0x7, "230644e76b2cfe4125edf43c9764374eb23d09b92d398cad31abc9fa6a16393e2742fe3a518b5826778d04912c99aefaa322963d772a2421506ca2c696737eef6e95e35daf013c7abbbf42d74b035bcef9688eae1805a7ca226d40b791e3572b7e55218ca3156860a178a4c8e599e578c7295f22f8a96ae4b3dedbc159cfae129fb1719d31d0ba3dbc4c37973b6a94658438534d8559b98db93ac6f9b9f4eda66aaa4f119a91"}, {0x10, 0x103, 0x7}, {0xc8, 0x84, 0x7fff, "c1868f18e171a8d99b63f1d6b4d14e7677b1180918bbf55614087c617ca3c41e20cb1c4574218cbcdbb1066e13c0bcba118e04f1c4f6cdbcd07c6f8fcb54aa294c6213973c251f9f3ed17d7a0941e663edc081eb8ca5906ed9742437d64c248bd9f9c75ad604e412d9e43f64cc030496af93c29c314d0b17faaaf236aa9f9cab2b6d69f1be78c50c4a53a74993de42058acd09b9b80d0024de80a8dd0fb86e1c67f16f94742d2b4452e9abc995d688bcb9e42a01fa82"}], 0x228}, 0x4c841) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000080)=0x34fa) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/user\x00') 21:28:17 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xa0629c2a) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x7f}, 0xc) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r4, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r5}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r4, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x0, '\x00', r8, r9, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r5, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r4, r6, r7], 0x0, 0x10, 0x5}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x100, '\x00', r8, r9, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r11}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r8, 0x27, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r12, r5, 0x6, &(0x7f000000bf80)=[r6, r7, r10], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4e, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x0, 0x0}, 0x8) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x58, '\x00', 0x0, r0, 0x3, 0x3, 0x1}, 0x48) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r18}, 0x18) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x2, 0x1, 0x4}, 0x48) r20 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x21, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4b2d}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xfffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xc, '\x00', r13, 0x1b, r0, 0x8, &(0x7f00000004c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x6, 0x0, 0x6}, 0x10, r14, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, r15, r16, r17, r18, r19, r20], &(0x7f0000000800)=[{0x4, 0x2, 0x8, 0x1}], 0x10, 0xc73}, 0x90) 21:28:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000000c0)="5e140f5e376b74d7cb00cdae56e875f7dd017140ff645aaade17b670c159b21365364606019e2c1eae671b8583291813bcffb6b4503488a180a0b31030b93ef6415f25022c919d793d0d7c3c57e271f5cfd3cc205e239c995ea144d4a22ea6db008ddc9bae3941417f00b9290c26af5ffe3747caee9348b64e5e8073", 0x7c}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="b605d81ed258cdb429ab63f326c819bf5967dd84270fa79941cf42c4d5a376", 0x1f}, {&(0x7f0000002180)="24728ed563c437953ac99e6b4081d0a7a095fcaed990a56c38a533c2b5a3d1a622cab41b7b025246a9cf042819896d8377ccbd3c36bf325d40dc134e402f30e74d1782208b1409a1cdb35c4d697fb62a28e128c0ccfc33304c8e2910fdb99afc4e7268d7bef177e3b97a4c8f12ac99212d7a99b67c46c8e5cca6fbbb08", 0x7d}], 0x5, &(0x7f0000002280)=[{0x98, 0x104, 0x5, "843c2a6563a9eaf38507e8b9c5be436f17dec671f8c21659beade2348956a57be686c9caad6cd6bc2b56017ff6f4cf2b0897f371afbc7a48739f62bf581a2837e1875a2fd876dfc7fd47ed85095abbd47b68c375d25b7dfd83f8ab2a179a9c07e87acfe345805b813f5ec264b842adf7c244ef1c7f311579d7ababbcef71b54cfa4c3dbc"}, {0xb8, 0x10d, 0x7, "230644e76b2cfe4125edf43c9764374eb23d09b92d398cad31abc9fa6a16393e2742fe3a518b5826778d04912c99aefaa322963d772a2421506ca2c696737eef6e95e35daf013c7abbbf42d74b035bcef9688eae1805a7ca226d40b791e3572b7e55218ca3156860a178a4c8e599e578c7295f22f8a96ae4b3dedbc159cfae129fb1719d31d0ba3dbc4c37973b6a94658438534d8559b98db93ac6f9b9f4eda66aaa4f119a91"}, {0x10, 0x103, 0x7}, {0xc8, 0x84, 0x7fff, "c1868f18e171a8d99b63f1d6b4d14e7677b1180918bbf55614087c617ca3c41e20cb1c4574218cbcdbb1066e13c0bcba118e04f1c4f6cdbcd07c6f8fcb54aa294c6213973c251f9f3ed17d7a0941e663edc081eb8ca5906ed9742437d64c248bd9f9c75ad604e412d9e43f64cc030496af93c29c314d0b17faaaf236aa9f9cab2b6d69f1be78c50c4a53a74993de42058acd09b9b80d0024de80a8dd0fb86e1c67f16f94742d2b4452e9abc995d688bcb9e42a01fa82"}], 0x228}, 0x4c841) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000080)=0x34fa) (async) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/user\x00') 21:28:18 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xa0629c2a) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xa0629c2a) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x7f}, 0xc) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r4, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r5}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r4, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x0, '\x00', r8, r9, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r5, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r4, r6, r7], 0x0, 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r4, r6, r7], 0x0, 0x10, 0x5}, 0x90) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x100, '\x00', r8, r9, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r11}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r8, 0x27, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r12, r5, 0x6, &(0x7f000000bf80)=[r6, r7, r10], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4e, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4e, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540), 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x0, 0x0}, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x58, '\x00', 0x0, r0, 0x3, 0x3, 0x1}, 0x48) (async) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x58, '\x00', 0x0, r0, 0x3, 0x3, 0x1}, 0x48) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) (async) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r18}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r18}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x2, 0x1, 0x4}, 0x48) (async) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x48) (async) r20 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x21, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4b2d}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xfffffff8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xc, '\x00', r13, 0x1b, r0, 0x8, &(0x7f00000004c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x6, 0x0, 0x6}, 0x10, r14, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, r15, r16, r17, r18, r19, r20], &(0x7f0000000800)=[{0x4, 0x2, 0x8, 0x1}], 0x10, 0xc73}, 0x90) 21:28:18 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') [ 1029.321144][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1029.328663][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1029.353602][T17345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1029.376497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1029.385602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1029.411016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1029.420890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1029.442637][T17345] device veth0_vlan entered promiscuous mode [ 1029.459058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1029.469087][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1029.482862][T17345] device veth1_vlan entered promiscuous mode [ 1029.508073][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1029.516820][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1029.530845][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1029.539400][ T3535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1029.562692][T17345] device veth0_macvtap entered promiscuous mode [ 1029.585839][T17345] device veth1_macvtap entered promiscuous mode [ 1029.613106][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.630336][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.649465][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.670317][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.693302][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.710226][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.727931][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.749824][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.770323][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1029.786735][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.803810][T17345] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1029.818512][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1029.827493][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1029.844260][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1029.860986][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1029.883751][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1029.906029][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.920385][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1029.944418][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.957941][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1029.974600][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1029.992416][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.014460][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.033107][T17345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1030.052852][T17345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1030.078070][T17345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1030.204456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1030.220975][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1030.232141][T17345] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1030.252341][T17345] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1030.270892][T17345] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1030.280702][T17345] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:28:19 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffff5) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3f}, 0x8) 21:28:20 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') [ 1030.587624][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1030.630308][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1030.651653][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1030.669849][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1030.678625][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 21:28:20 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1031.248564][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:28:20 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') 21:28:21 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, 0x0) 21:28:21 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') 21:28:21 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, 0x0) 21:28:22 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') 21:28:22 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 21:28:22 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') 21:28:23 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, 0x0) 21:28:23 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 21:28:23 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') 21:28:23 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 21:28:24 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1034.552093][T17347] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1034.674583][T17347] netdevsim netdevsim4 netdevsim1: renamed from eth1 21:28:24 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000000000") [ 1035.255575][T17347] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1035.289105][T17347] netdevsim netdevsim4 netdevsim3: renamed from eth3 21:28:25 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffff5) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3f}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffff5) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3f}, 0x8) (async) 21:28:25 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1035.443032][T17349] netdevsim netdevsim0 netdevsim0: renamed from eth0 21:28:25 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r2 = gettid() sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/user\x00') syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1035.708546][T17349] netdevsim netdevsim0 netdevsim1: renamed from eth1 21:28:25 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001840)={&(0x7f00000002c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000400)="c19f8164d008b4c78924ef35e65a88aa6f4e539c69d9c109337109b9991995e8320df8024f834db85093fdcc8347b549b0ff910ef6c2bdba9981ef5c4d8409e2d07a05f9c33ba55e697c193e36ffca116aa3239b622ac76c87ebc3d9b7b6a58400fa8b8dcdb092978ee9299968cdb3bef71e3c76f694228a302c53e36c2fa2515dff9fd955364ab891cbd5df9ddd53ab85d180e83a82cefdc2069eb8d807c78c15988106c59095f997eace1a7c3d7df4fd977ec05466f686a2caa55899d9cb72c67e17ad73c3376f56686914e481f46c47b0fb186d1df8b71dcd7b0d9692b37e7bb0", 0xe2}, {&(0x7f0000000340)="a1443ad4f9772cacd9b10b209e8d8515444298b703aa18e94f0621a0b366527b2a4fbbe8528986922144db1f6bb6694edf9f63913207cfa8fd17528195533e41523cddd769e471cb1640009871928be692a278b3cf997eb987098dd9a4d55ba5548985486e256091a4f4cd", 0x6b}, {&(0x7f0000000500)="ba55cfa5516d4f2cbcc505c248", 0xd}, {&(0x7f0000000540)="f8370cb851587b00577de2b08b4d74313b5facd8ba52c2099402157f54bc3bc7782788746a2bef59306271aa365dfcfb599e4db9abc49e3f6a6fddd0f616808b420338549a6596bd433b6053b38e29a52f21274f5a5cda1245a7fbe1b8195d61022e878aec92fc9c5097f69d4161600a6987bef7a4c59aa46159dae1375b4bcf63f91eb7f5ebc887bdf025da5ad00391bc6daaa6e3c16369864aa034000732d50db358a48cd02fd5bf0554bec5267e16b291559633cf9722b7a85f989b97995b0c81f79871f0d75a3d39166fbea639499cee1cd39d", 0xd5}], 0x4, &(0x7f0000000680)=[{0x1010, 0x113, 0x3f, "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"}, {0xb0, 0x119, 0x6, "3cdd73eafc3fe6d7709b6196659ee69ca25e43fb902cd8972399fd874d51cc7e41d5b2aa245c1bb691df57bc6bd66ab6e45811ec638586c84b3731d3f7fab60556acd78f131a1d96caf3ed3e6c60b8e7a407f143b9e295c8458ce076a2312c435369078757df253f346946879b447b070241c9f082d4cf123bc6614ee7f499855d06b395a5a2d8bd294c0a0f83b5a3b09fd94963cec2898ec14452d01a21"}, {0xd0, 0x112, 0x10001, "ebd253598b19486faa1fe999f01d4754917a138bdd709b686e9f9009e65e387fa0307a73444c0788108f9e15d357873148e969e62a4d54c898b35dc7ef22ade951a3955ac2ad80efd5357b462c1a571c55d9d67a4ea2793fed0c0e1cacda4aaf6e610928e4844b6aac97d5c497c1bc7d891377bd189366e0e4a2a64bca3af2e7c49174d70e1feb90e523ce2b3c8e2cb0e87fbeb373e15d13c06183286b1e3316d1624a329d73dd3f2e724ebbbbf269819cc3103f665cb60a2224ef4491e822"}], 0x1190}, 0x200000c0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @multicast1}, 0x1, 0x3, 0x2, 0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="8355661452d19fd05a409d7dc6e00f64fcefc76e5c49100908d019b759945f529807126d8ee4428ef94ae05581a840c7583e0c70535ba4b2d169e4b01eeea7673f747c6735ec6c3caa16e8ea0f97afc9a8e3df7317bcc9d62505eba4e8631cce357368117d276ab03e8493e3421f2bfa7e0681ed04c2d790f3d5ca965dc6c88dd4a47035566fc45dc292b55c0b6aac0fe6afa287cfc27d893b31d59baa8e89ecf31593a32bf9e6c87436afd1df2727ba34206b69acb1a1fd43a83bb091e048a0be2ddd7f047b930b9ffcb9c4f882610b0c73958f3ff3a36bfabac11bfed2cb68d3b7a582884bec01130c", 0xea}], 0x1, &(0x7f0000000200)=[{0x68, 0x19a, 0xc14, "433cf844f56042ee031e68e0b09afc33aab942e38e48a75288e1989b3e049f868f6f0e1df45a4efb1136802d43604a3878d215ec6a6fbe05de624c3fd96ce413aed02e22cd7656bb7aef5618a8b8d18c4528356a6e"}], 0x68}, 0x3c000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 21:28:25 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r2 = gettid() sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1035.946679][T17349] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1036.071631][T17349] netdevsim netdevsim0 netdevsim3: renamed from eth3 21:28:25 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 21:28:25 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') gettid() syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1036.228437][T17354] netdevsim netdevsim1 netdevsim0: renamed from eth0 21:28:26 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) (async) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001840)={&(0x7f00000002c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000400)="c19f8164d008b4c78924ef35e65a88aa6f4e539c69d9c109337109b9991995e8320df8024f834db85093fdcc8347b549b0ff910ef6c2bdba9981ef5c4d8409e2d07a05f9c33ba55e697c193e36ffca116aa3239b622ac76c87ebc3d9b7b6a58400fa8b8dcdb092978ee9299968cdb3bef71e3c76f694228a302c53e36c2fa2515dff9fd955364ab891cbd5df9ddd53ab85d180e83a82cefdc2069eb8d807c78c15988106c59095f997eace1a7c3d7df4fd977ec05466f686a2caa55899d9cb72c67e17ad73c3376f56686914e481f46c47b0fb186d1df8b71dcd7b0d9692b37e7bb0", 0xe2}, {&(0x7f0000000340)="a1443ad4f9772cacd9b10b209e8d8515444298b703aa18e94f0621a0b366527b2a4fbbe8528986922144db1f6bb6694edf9f63913207cfa8fd17528195533e41523cddd769e471cb1640009871928be692a278b3cf997eb987098dd9a4d55ba5548985486e256091a4f4cd", 0x6b}, {&(0x7f0000000500)="ba55cfa5516d4f2cbcc505c248", 0xd}, {&(0x7f0000000540)="f8370cb851587b00577de2b08b4d74313b5facd8ba52c2099402157f54bc3bc7782788746a2bef59306271aa365dfcfb599e4db9abc49e3f6a6fddd0f616808b420338549a6596bd433b6053b38e29a52f21274f5a5cda1245a7fbe1b8195d61022e878aec92fc9c5097f69d4161600a6987bef7a4c59aa46159dae1375b4bcf63f91eb7f5ebc887bdf025da5ad00391bc6daaa6e3c16369864aa034000732d50db358a48cd02fd5bf0554bec5267e16b291559633cf9722b7a85f989b97995b0c81f79871f0d75a3d39166fbea639499cee1cd39d", 0xd5}], 0x4, &(0x7f0000000680)=[{0x1010, 0x113, 0x3f, "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"}, {0xb0, 0x119, 0x6, "3cdd73eafc3fe6d7709b6196659ee69ca25e43fb902cd8972399fd874d51cc7e41d5b2aa245c1bb691df57bc6bd66ab6e45811ec638586c84b3731d3f7fab60556acd78f131a1d96caf3ed3e6c60b8e7a407f143b9e295c8458ce076a2312c435369078757df253f346946879b447b070241c9f082d4cf123bc6614ee7f499855d06b395a5a2d8bd294c0a0f83b5a3b09fd94963cec2898ec14452d01a21"}, {0xd0, 0x112, 0x10001, "ebd253598b19486faa1fe999f01d4754917a138bdd709b686e9f9009e65e387fa0307a73444c0788108f9e15d357873148e969e62a4d54c898b35dc7ef22ade951a3955ac2ad80efd5357b462c1a571c55d9d67a4ea2793fed0c0e1cacda4aaf6e610928e4844b6aac97d5c497c1bc7d891377bd189366e0e4a2a64bca3af2e7c49174d70e1feb90e523ce2b3c8e2cb0e87fbeb373e15d13c06183286b1e3316d1624a329d73dd3f2e724ebbbbf269819cc3103f665cb60a2224ef4491e822"}], 0x1190}, 0x200000c0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @multicast1}, 0x1, 0x3, 0x2, 0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="8355661452d19fd05a409d7dc6e00f64fcefc76e5c49100908d019b759945f529807126d8ee4428ef94ae05581a840c7583e0c70535ba4b2d169e4b01eeea7673f747c6735ec6c3caa16e8ea0f97afc9a8e3df7317bcc9d62505eba4e8631cce357368117d276ab03e8493e3421f2bfa7e0681ed04c2d790f3d5ca965dc6c88dd4a47035566fc45dc292b55c0b6aac0fe6afa287cfc27d893b31d59baa8e89ecf31593a32bf9e6c87436afd1df2727ba34206b69acb1a1fd43a83bb091e048a0be2ddd7f047b930b9ffcb9c4f882610b0c73958f3ff3a36bfabac11bfed2cb68d3b7a582884bec01130c", 0xea}], 0x1, &(0x7f0000000200)=[{0x68, 0x19a, 0xc14, "433cf844f56042ee031e68e0b09afc33aab942e38e48a75288e1989b3e049f868f6f0e1df45a4efb1136802d43604a3878d215ec6a6fbe05de624c3fd96ce413aed02e22cd7656bb7aef5618a8b8d18c4528356a6e"}], 0x68}, 0x3c000) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 1036.423123][T17354] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1036.494241][T17354] netdevsim netdevsim1 netdevsim2: renamed from eth2 21:28:26 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 21:28:26 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1036.641509][T17354] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1036.827301][T17347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1036.894184][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1036.911258][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:28:26 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') gettid() syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:26 executing program 3: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1036.953739][T17347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1037.002097][T17349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1037.036545][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1037.052130][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1037.070689][T15720] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.077783][T15720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.110615][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1037.121394][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1037.135220][T15720] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.142326][T15720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.165770][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1037.179393][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1037.215998][T17354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1037.255882][T17349] 8021q: adding VLAN 0 to HW filter on device team0 [ 1037.281001][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1037.289525][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1037.300895][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1037.309469][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:28:27 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fd") [ 1037.332457][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1037.344609][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1037.360916][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1037.377019][T17354] 8021q: adding VLAN 0 to HW filter on device team0 21:28:27 executing program 3: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1037.421222][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1037.429227][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1037.463457][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1037.482385][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1037.499281][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1037.521121][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1037.537872][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1037.570721][T15721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.577808][T15721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.594547][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:28:27 executing program 2: getpid() syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1037.620960][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1037.634971][T15721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.642081][T15721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.660595][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1037.685140][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1037.693419][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1037.710961][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1037.756285][T17347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1037.771120][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:28:27 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fd") [ 1037.800799][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1037.809332][ T3560] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.816449][ T3560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1037.840645][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1037.860921][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1037.880763][ T3560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.887853][ T3560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1037.920555][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1037.929366][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1037.967926][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1037.987237][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1038.050097][T17349] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1038.091063][T17349] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1038.145005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1038.153720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1038.181050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:28:27 executing program 2: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1038.210950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1038.231000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1038.250800][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1038.265445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1038.291259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:28:27 executing program 3: syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1038.320707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1038.340925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1038.352473][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1038.381131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1038.411694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1038.441106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1038.470853][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1038.479755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1038.488909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1038.515663][T17354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1038.544020][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1038.560980][T15703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:28:28 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fd") 21:28:28 executing program 2: getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:28 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8") 21:28:28 executing program 2: syz_clone(0x0, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:28 executing program 3: getpid() syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:29 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8") [ 1039.571863][T17347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1039.582884][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1039.600784][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1039.680586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1039.688259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1039.723900][T17349] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1039.775353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1039.790471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1039.809321][T17354] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1039.850155][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1039.871077][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1039.894944][T17349] device veth0_vlan entered promiscuous mode [ 1039.926424][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1039.940862][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1039.971450][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1039.979826][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 21:28:29 executing program 3: syz_clone(0x0, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1040.026651][T17349] device veth1_vlan entered promiscuous mode [ 1040.065049][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1040.082515][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1040.113552][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1040.144126][T17354] device veth0_vlan entered promiscuous mode 21:28:29 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xffffffffffffff94) [ 1040.184731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1040.195627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1040.220998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1040.257755][T17354] device veth1_vlan entered promiscuous mode [ 1040.276246][T17349] device veth0_macvtap entered promiscuous mode [ 1040.308824][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1040.317491][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1040.330858][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1040.338955][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1040.381173][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1040.400926][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1040.415730][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1040.447529][T17347] device veth0_vlan entered promiscuous mode [ 1040.502821][T17349] device veth1_macvtap entered promiscuous mode [ 1040.511780][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1040.524968][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1040.552296][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1040.570807][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1040.579166][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1040.613386][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1040.644556][T15720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 21:28:30 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8") [ 1040.677509][T17347] device veth1_vlan entered promiscuous mode [ 1040.712730][T17354] device veth0_macvtap entered promiscuous mode [ 1040.724857][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1040.741703][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1040.749587][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1040.801450][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1040.814771][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 21:28:30 executing program 2: syz_clone(0x0, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1040.860680][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1040.881517][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1040.930773][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1040.950282][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1040.990238][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.000078][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.040443][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:28:30 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xffffffffffffff94) [ 1041.080798][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.110402][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.140515][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.190238][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.211591][T17349] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1041.233350][T17354] device veth1_macvtap entered promiscuous mode [ 1041.280737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1041.289539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1041.312955][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1041.330601][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.359572][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1041.380265][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.390132][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 21:28:31 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a") [ 1041.442671][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.460263][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1041.496735][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.530260][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1041.542801][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.555246][T17349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1041.566439][T17349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.581911][T17349] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1041.599139][T17347] device veth0_macvtap entered promiscuous mode [ 1041.620477][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1041.629222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1041.646168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1041.656387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1041.675521][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.692370][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.711383][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.724920][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.741397][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.760165][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.770785][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 21:28:31 executing program 3: syz_clone(0x5002000, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") [ 1041.793913][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.810240][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.830248][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.859514][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 21:28:31 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/29, 0x1d}, {&(0x7f0000000640)=""/104, 0x68}], 0x2, &(0x7f0000000700)=""/19, 0x13}, 0x23) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, r1, 0x3, 0x4}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x2, 0x3, 0x1, 0x81, r2, 0xae, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) sendmsg$inet(r0, &(0x7f0000001000)={&(0x7f00000004c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000f00)="65a485ad132e0bf2be282d68d4d2849ba4ec892b2eb9a072336b8e77ee63c65eba56f72f487b7c882b9d9a6f3d5834cf3db0bedb783ca81e779afa43fa6c234e3d55d90dbea7f696b9beb7e62aa2493c339f6f405f1a27e83f29ca2c5cef9f0574e010021fe67da37bb06dbbf6ef51c629aa90e177ae500313e23c9cbbfac915c7973ac6e5d585ade44179878041bd1535f108", 0x93}], 0x1, &(0x7f0000000fc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@noop, @ra={0x94, 0x4}]}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@rr={0x7, 0x17, 0x29, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102]}]}}}], 0x40}, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r6}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x100, '\x00', 0x0, r1, 0x3, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r5, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x0, '\x00', r10, r11, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=ANY=[@ANYBLOB="1800000003000000000000000900000018110000", @ANYRES32=r9, @ANYBLOB="00000000000500000000000000000000b7030000000000008500000083000000bf09365192d7efaad58f0000000000181100"/60, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600010000000000000007000000181100"/52, @ANYRES32=r5, @ANYBLOB="0000000000000000b70200000000000085000000860000008a03fcff01000000186200000d000000000000000100008018290000", @ANYRES32=r12, @ANYBLOB="000000000100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000800008500000006000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff99, &(0x7f000000acc0)=[r5, r8, r9], 0x0, 0x10, 0x5}, 0x90) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x100, '\x00', r10, r11, 0x1, 0x5, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r13}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r2, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa1, &(0x7f0000000b80)=[{}], 0x8, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0xd8, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x3, 0x14, &(0x7f00000008c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ldst={0x0, 0x3, 0x2, 0x7, 0x4, 0x80, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xd, 0x2, 0x5, 0x18, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x37}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}], &(0x7f0000000980)='GPL\x00', 0xfffff093, 0x5b, &(0x7f00000009c0)=""/91, 0x41100, 0x24, '\x00', r10, 0x31, r11, 0x8, &(0x7f0000000a40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x7, 0x7, 0x101}, 0x10, r17, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000dc0)=[{0x2, 0x5, 0x0, 0x5}, {0x1, 0x5, 0x9}, {0x5, 0x2, 0x2, 0x1}, {0x3, 0x2, 0x10, 0x4}, {0x1, 0x4, 0x4, 0x7}]}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r14}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r10, 0x27, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r19, 0xffffffffffffffff, 0x6, &(0x7f000000bf80)=[r8, r9, r12], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001100)={r0, r18}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000010c0)={r9, 0x58, &(0x7f0000001040)}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f000000d940), 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f0000001180)=ANY=[@ANYBLOB="18000000ff0100000000000006000000181a0000", @ANYRESOCT=r7, @ANYBLOB="f2f441540a03000000666430", @ANYRES32=r4, @ANYBLOB="00000002000000000000850000008600000018230000000000000000", @ANYRES32=r2, @ANYBLOB="00000000070000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xfffffff8, 0xca, &(0x7f0000000200)=""/202, 0x41000, 0x52, '\x00', r16, 0xa, r1, 0x8, &(0x7f0000000300)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x9, 0x6e00, 0x1ff}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000380)=[r3, r2], &(0x7f0000001140)=[{0x3, 0x1, 0x8, 0x6}, {0x4, 0x2, 0xe, 0xb}, {0x5, 0x2, 0x3}], 0x10, 0xe18}, 0x90) [ 1041.912727][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1041.960248][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1041.990311][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.011509][T17354] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1042.023278][T17349] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.050251][T17349] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.059977][T17349] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.090282][T17349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.114100][T17347] device veth1_macvtap entered promiscuous mode [ 1042.135544][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1042.151018][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1042.171124][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1042.179818][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1042.212704][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.237393][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:28:31 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a") 21:28:31 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/29, 0x1d}, {&(0x7f0000000640)=""/104, 0x68}], 0x2, &(0x7f0000000700)=""/19, 0x13}, 0x23) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, r1, 0x3, 0x4}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x2, 0x3, 0x1, 0x81, r2, 0xae, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async) sendmsg$inet(r0, &(0x7f0000001000)={&(0x7f00000004c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000f00)="65a485ad132e0bf2be282d68d4d2849ba4ec892b2eb9a072336b8e77ee63c65eba56f72f487b7c882b9d9a6f3d5834cf3db0bedb783ca81e779afa43fa6c234e3d55d90dbea7f696b9beb7e62aa2493c339f6f405f1a27e83f29ca2c5cef9f0574e010021fe67da37bb06dbbf6ef51c629aa90e177ae500313e23c9cbbfac915c7973ac6e5d585ade44179878041bd1535f108", 0x93}], 0x1, &(0x7f0000000fc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@noop, @ra={0x94, 0x4}]}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@rr={0x7, 0x17, 0x29, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102]}]}}}], 0x40}, 0x11) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) (async, rerun: 32) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r6}, 0x18) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x100, '\x00', 0x0, r1, 0x3, 0x4, 0x2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r5, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)}, 0x20) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x0, '\x00', r10, r11, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=ANY=[@ANYBLOB="1800000003000000000000000900000018110000", @ANYRES32=r9, @ANYBLOB="00000000000500000000000000000000b7030000000000008500000083000000bf09365192d7efaad58f0000000000181100"/60, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600010000000000000007000000181100"/52, @ANYRES32=r5, @ANYBLOB="0000000000000000b70200000000000085000000860000008a03fcff01000000186200000d000000000000000100008018290000", @ANYRES32=r12, @ANYBLOB="000000000100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000800008500000006000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff99, &(0x7f000000acc0)=[r5, r8, r9], 0x0, 0x10, 0x5}, 0x90) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x100, '\x00', r10, r11, 0x1, 0x5, 0x5}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r13}, 0x20) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r2, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa1, &(0x7f0000000b80)=[{}], 0x8, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0xd8, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) (rerun: 64) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x3, 0x14, &(0x7f00000008c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ldst={0x0, 0x3, 0x2, 0x7, 0x4, 0x80, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xd, 0x2, 0x5, 0x18, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x37}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}], &(0x7f0000000980)='GPL\x00', 0xfffff093, 0x5b, &(0x7f00000009c0)=""/91, 0x41100, 0x24, '\x00', r10, 0x31, r11, 0x8, &(0x7f0000000a40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x7, 0x7, 0x101}, 0x10, r17, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000dc0)=[{0x2, 0x5, 0x0, 0x5}, {0x1, 0x5, 0x9}, {0x5, 0x2, 0x2, 0x1}, {0x3, 0x2, 0x10, 0x4}, {0x1, 0x4, 0x4, 0x7}]}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r14}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r10, 0x27, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r19, 0xffffffffffffffff, 0x6, &(0x7f000000bf80)=[r8, r9, r12], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001100)={r0, r18}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000010c0)={r9, 0x58, &(0x7f0000001040)}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f000000d940), 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x18, 0xb, &(0x7f0000001180)=ANY=[@ANYBLOB="18000000ff0100000000000006000000181a0000", @ANYRESOCT=r7, @ANYBLOB="f2f441540a03000000666430", @ANYRES32=r4, @ANYBLOB="00000002000000000000850000008600000018230000000000000000", @ANYRES32=r2, @ANYBLOB="00000000070000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xfffffff8, 0xca, &(0x7f0000000200)=""/202, 0x41000, 0x52, '\x00', r16, 0xa, r1, 0x8, &(0x7f0000000300)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x9, 0x6e00, 0x1ff}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000380)=[r3, r2], &(0x7f0000001140)=[{0x3, 0x1, 0x8, 0x6}, {0x4, 0x2, 0xe, 0xb}, {0x5, 0x2, 0x3}], 0x10, 0xe18}, 0x90) [ 1042.266763][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.290319][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.300155][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.326668][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.360720][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.390451][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.410254][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.430229][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.440067][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.470315][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.480148][T17354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1042.504397][T17354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.525326][T17354] batman_adv: batadv0: Interface activated: batadv_slave_1 21:28:32 executing program 3: syz_clone(0x5002000, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 1042.740962][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1042.749626][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1042.793457][T17354] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.810242][T17354] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.818954][T17354] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.852865][T17354] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.875857][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1042.901193][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.940293][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1042.970328][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1042.996406][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.020318][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.030156][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.060048][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:28:32 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a") 21:28:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) [ 1043.090345][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.120829][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.163516][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.180386][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.210381][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.230883][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.257043][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1043.280289][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.301807][T17347] batman_adv: batadv0: Interface activated: batadv_slave_0 21:28:33 executing program 2: syz_clone(0x5002000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") 21:28:33 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700") [ 1043.614055][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1043.623044][T32104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1043.634738][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.657267][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.670858][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.690283][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.729712][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.760408][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.780920][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.800914][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.827998][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.860405][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:28:33 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x33) [ 1043.880601][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.905920][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1043.930313][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1043.960923][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:28:33 executing program 3: syz_clone(0x5002000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1043.990256][T17347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1044.006852][T17347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1044.039275][T17347] batman_adv: batadv0: Interface activated: batadv_slave_1 21:28:33 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700") 21:28:33 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x33) [ 1044.438929][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1044.461439][T10353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1044.592497][T17347] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1044.632591][T17347] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1044.653212][T17347] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1044.662265][T17347] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:28:34 executing program 2: syz_clone(0x5002000, 0x0, 0x0, 0x0, 0x0, 0x0) 21:28:34 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700") 21:28:34 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2}, @ringbuf_query], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f000000bf80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r1, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x0, '\x00', r5, r6, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r2, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f00000003c0)=ANY=[@ANYBLOB="250009f60000181100009899dc08d1801962e8f1088a35c4e621231b39beca0ae22ccaa77a24916577f62814310f970c47255ca04a68f2b810f7ff477938a242462d433e351af7711cd814f70af937e7921cee263f228a48094bf1cd0e9757f864b27515f7f465ccd03bba14fc4f279097b3bf5096c47e9d2a0e6db74eeb3044390ddce3622a545306", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000053b0000040000001800000001000000000000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000008a03fcff01000000186200000d000000000000000100008018290000", @ANYRES32=r7, @ANYBLOB="000000000100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000800008500000006000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r1, r3, r4], 0x0, 0x10, 0x5}, 0x90) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x100, '\x00', r5, r6, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r5, 0x27, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r9, r2, 0x6, &(0x7f000000bf80)=[r3, r4, r7], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f000000d5c0)={&(0x7f000000c440)="1bce63efae5f49289f561357144431525b938adfcd2ee7294b5b592b7a5bd2bce333082bb180e6fab074c1d8c29d3bafc703cc338bea962f36ca99da96e406280891f015dc0639dea5d0807f88acdbcf776ed46254", &(0x7f000000c4c0)=""/4096, &(0x7f000000d4c0)="dcfe1e2599c16d32e663314aed421ab352a9be45f529fe9926d85f9d7a0e09c89335909e720a28994e1177cb1d5a992cf27b2927cccd20e1c80a079114f581633817f4daf522a05986f54b93fd9826bf5a793beb76d90a2bfd2bdb287fc887543d255e97dd44511068f08efb59a3b455cc4b73b084d8c56e4cfdce3f28119375ab00a7cbc34740dbb78f0be73c2739cdf294b707dcb8aa9b963f024dfc27156c5b11841b0d997fa09fafec6e1e03650f33575409d8967dc3f63e2d9e", &(0x7f000000d580)="3811339399d0222785e02c8a6eda7dec69d34b946e20de08288a96de86a389ddf4", 0x53f, r7}, 0x38) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r10, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r11}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r10, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x0, '\x00', r14, r15, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r11, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r10, r12, r13], 0x0, 0x10, 0x5}, 0x90) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x100, '\x00', r14, r15, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r17}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r14, 0x27, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r18, r11, 0x6, &(0x7f000000bf80)=[r12, r13, r16], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f000000d5c0)={&(0x7f000000c440)="1bce63efae5f49289f561357144431525b938adfcd2ee7294b5b592b7a5bd2bce333082bb180e6fab074c1d8c29d3bafc703cc338bea962f36ca99da96e406280891f015dc0639dea5d0807f88acdbcf776ed46254", &(0x7f000000c4c0)=""/4096, &(0x7f000000d4c0)="dcfe1e2599c16d32e663314aed421ab352a9be45f529fe9926d85f9d7a0e09c89335909e720a28994e1177cb1d5a992cf27b2927cccd20e1c80a079114f581633817f4daf522a05986f54b93fd9826bf5a793beb76d90a2bfd2bdb287fc887543d255e97dd44511068f08efb59a3b455cc4b73b084d8c56e4cfdce3f28119375ab00a7cbc34740dbb78f0be73c2739cdf294b707dcb8aa9b963f024dfc27156c5b11841b0d997fa09fafec6e1e03650f33575409d8967dc3f63e2d9e", &(0x7f000000d580)="3811339399d0222785e02c8a6eda7dec69d34b946e20de08288a96de86a389ddf4", 0x53f, r16}, 0x38) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x7}, [@alu={0x4, 0x1, 0xa, 0x7, 0x7, 0x4, 0xffffffffffffffff}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x5}]}, &(0x7f0000000100)='syzkaller\x00', 0x100, 0x4a, &(0x7f0000000140)=""/74, 0x41100, 0x2, '\x00', 0x0, 0x20, r0, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x1, 0x0, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000280)=[r7, r16, r19, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x1, 0x1, 0x10, 0x2}, {0x2, 0x2, 0x2, 0xc}], 0x10, 0x4f}, 0x90) [ 1045.118386][T14466] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.140392][T14466] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 21:28:34 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000") [ 1045.557990][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1045.583704][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 21:28:35 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') r3 = gettid() sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) r4 = syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') getpid() (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) (async) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') (async) gettid() (async) sendmsg$unix(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) (async) syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/user\x00') (async) recvmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="f414001400981aef90ceff471626"], 0xfffffed4}, 0x2000) (async) syz_clone(0x5002000, &(0x7f00000003c0)="0e0aec12cd372f8536726f117c23487583b1c274c7ae4b00777f4ffefd9288924557d77a7d59ed1006c1b363935d88293eafededc37806ccd811b24d3b3b77e45a1b9492e820c89edc5bac340464823da597a2dd1b833e6b889ba5df06203b74e77243a5722b769bc6399d3bdf5f146c05e98ee23ac3a4ee870cdaa99124f88c5a5bc45b4a3648e99cb93707c7ad3ef45c77629270262f27f4c88896a0ca0fbd94f7632c4403e383d8b7b7715f007bd8d27767f422dee3b08ce3e65168953d28b7803af0d7281c1ea34cfd3c9370063d1b4408e1a44f79b11848f25ebe46bf93ab5cd5a4", 0xe4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000004c0)="dea15827704240efe95c052348304a443256c15564fb5245352efb678bd912c1f430e39a03e3c7001ed710ce06e07e1d14f15301776417fdc38897552fa9cd458ce3ddecdd20f1d085aae38950954a43c8242273f2a34407949bc4889a05dd8eef50aefcafaee31690c9c36bc4ed41c5792b557fbb688c0a53bfd2ef1afe3f703128e3fedc") (async) syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/mnt\x00') (async) [ 1045.610437][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.622621][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1045.675991][ T3586] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.685163][ T3586] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.702954][T14466] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.713455][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1045.729163][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1045.742190][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.750837][T14466] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.762612][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:28:35 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:35 executing program 1: getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x10020000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) [ 1045.779860][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1045.814804][ T3586] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 21:28:35 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1045.836009][ T3586] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1045.873725][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:28:35 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000") 21:28:35 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:35 executing program 3: bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x303c41, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x85, &(0x7f0000000080)=""/133, 0x41000, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x8, 0x3, 0xfffffffe}, 0x10, 0x2ece8, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0x1, 0x1], &(0x7f0000000200)=[{0x3, 0x5, 0x7, 0xa}, {0x5, 0x5, 0x1, 0x7}, {0x0, 0x5, 0x2, 0xa}, {0x5, 0x3, 0x0, 0x4}, {0x2, 0x1, 0x9, 0x9}, {0x3, 0x3, 0x9, 0x1}, {0x5, 0x5, 0x81}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x2, 0x10, 0x8}], 0x10, 0x9}, 0x90) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000380)=r1) 21:28:35 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2}, @ringbuf_query], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f000000bf80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async, rerun: 32) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) (async, rerun: 32) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r1, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r2}, 0x20) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) (rerun: 64) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x0, '\x00', r5, r6, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r2, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f00000003c0)=ANY=[@ANYBLOB="250009f60000181100009899dc08d1801962e8f1088a35c4e621231b39beca0ae22ccaa77a24916577f62814310f970c47255ca04a68f2b810f7ff477938a242462d433e351af7711cd814f70af937e7921cee263f228a48094bf1cd0e9757f864b27515f7f465ccd03bba14fc4f279097b3bf5096c47e9d2a0e6db74eeb3044390ddce3622a545306", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000053b0000040000001800000001000000000000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000008a03fcff01000000186200000d000000000000000100008018290000", @ANYRES32=r7, @ANYBLOB="000000000100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000800008500000006000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r1, r3, r4], 0x0, 0x10, 0x5}, 0x90) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x100, '\x00', r5, r6, 0x1, 0x5, 0x5}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r5, 0x27, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r9, r2, 0x6, &(0x7f000000bf80)=[r3, r4, r7], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f000000d5c0)={&(0x7f000000c440)="1bce63efae5f49289f561357144431525b938adfcd2ee7294b5b592b7a5bd2bce333082bb180e6fab074c1d8c29d3bafc703cc338bea962f36ca99da96e406280891f015dc0639dea5d0807f88acdbcf776ed46254", &(0x7f000000c4c0)=""/4096, &(0x7f000000d4c0)="dcfe1e2599c16d32e663314aed421ab352a9be45f529fe9926d85f9d7a0e09c89335909e720a28994e1177cb1d5a992cf27b2927cccd20e1c80a079114f581633817f4daf522a05986f54b93fd9826bf5a793beb76d90a2bfd2bdb287fc887543d255e97dd44511068f08efb59a3b455cc4b73b084d8c56e4cfdce3f28119375ab00a7cbc34740dbb78f0be73c2739cdf294b707dcb8aa9b963f024dfc27156c5b11841b0d997fa09fafec6e1e03650f33575409d8967dc3f63e2d9e", &(0x7f000000d580)="3811339399d0222785e02c8a6eda7dec69d34b946e20de08288a96de86a389ddf4", 0x53f, r7}, 0x38) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) (async) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r10, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r11}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r10, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) (rerun: 32) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x0, '\x00', r14, r15, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r11, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r10, r12, r13], 0x0, 0x10, 0x5}, 0x90) (async, rerun: 32) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r12, 0x100, '\x00', r14, r15, 0x1, 0x5, 0x5}, 0x48) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r17}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r14, 0x27, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r18, r11, 0x6, &(0x7f000000bf80)=[r12, r13, r16], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f000000d5c0)={&(0x7f000000c440)="1bce63efae5f49289f561357144431525b938adfcd2ee7294b5b592b7a5bd2bce333082bb180e6fab074c1d8c29d3bafc703cc338bea962f36ca99da96e406280891f015dc0639dea5d0807f88acdbcf776ed46254", &(0x7f000000c4c0)=""/4096, &(0x7f000000d4c0)="dcfe1e2599c16d32e663314aed421ab352a9be45f529fe9926d85f9d7a0e09c89335909e720a28994e1177cb1d5a992cf27b2927cccd20e1c80a079114f581633817f4daf522a05986f54b93fd9826bf5a793beb76d90a2bfd2bdb287fc887543d255e97dd44511068f08efb59a3b455cc4b73b084d8c56e4cfdce3f28119375ab00a7cbc34740dbb78f0be73c2739cdf294b707dcb8aa9b963f024dfc27156c5b11841b0d997fa09fafec6e1e03650f33575409d8967dc3f63e2d9e", &(0x7f000000d580)="3811339399d0222785e02c8a6eda7dec69d34b946e20de08288a96de86a389ddf4", 0x53f, r16}, 0x38) (async) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x7}, [@alu={0x4, 0x1, 0xa, 0x7, 0x7, 0x4, 0xffffffffffffffff}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x5}]}, &(0x7f0000000100)='syzkaller\x00', 0x100, 0x4a, &(0x7f0000000140)=""/74, 0x41100, 0x2, '\x00', 0x0, 0x20, r0, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x1, 0x0, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000280)=[r7, r16, r19, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x1, 0x1, 0x10, 0x2}, {0x2, 0x2, 0x2, 0xc}], 0x10, 0x4f}, 0x90) 21:28:35 executing program 0: bpf$BPF_PROG_TEST_RUN_LIVE(0x13, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) 21:28:35 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700000000") 21:28:35 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:35 executing program 4: bpf$BPF_PROG_TEST_RUN_LIVE(0x14, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) 21:28:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:36 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e0700") 21:28:36 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:36 executing program 3: bpf$BPF_PROG_TEST_RUN_LIVE(0x15, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) 21:28:36 executing program 1: bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x303c41, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="1862000006000000000000000000000138060000000080850000006b000000186400000100000000000000ffff0000e4626e14bc0c8eb180a327666001b8e39da9ce08a57c7e0f3fc7ac5d56ebbfd5ae8d327548dee4982d63a7f210b2437c181cbca5ce2df25fc705dc41d1a9e2e9f5f9a8df7f5dcc6f9a9203e1a102c224c8a724c63a1953271b58adfef401fe03b99e10931201effe6a8776164280432d73e034e246afb71c6133623299e0a238a841c209aa9fbd80990022e3e51f7ef59050b1fed63c1d4570dde73c30e2c75076e1eba8a6a836c83b7997259fc28028099b9752e68ab356fdde741ae76f2af9413dce7ff2e52b6882599e98"], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x85, &(0x7f0000000080)=""/133, 0x41000, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x8, 0x3, 0xfffffffe}, 0x10, 0x2ece8, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0x1, 0x1], &(0x7f0000000200)=[{0x3, 0x5, 0x7, 0xa}, {0x5, 0x5, 0x1, 0x7}, {0x0, 0x5, 0x2, 0xa}, {0x5, 0x3, 0x0, 0x4}, {0x2, 0x1, 0x9, 0x9}, {0x3, 0x3, 0x9, 0x1}, {0x5, 0x5, 0x81}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x2, 0x10, 0x8}], 0x10, 0x9}, 0x90) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000380)=r1) 21:28:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:36 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc") 21:28:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:36 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:36 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:36 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55") 21:28:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:37 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:37 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83") 21:28:37 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:37 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "235195d2150fd98fb40ff763c2487507aa428152a1239d1e87f951440d821179a8ea354a4773986af4d0c7a71b46b0f74d0a4fb3db52f1dbbf4074b9e2950cd99af58b1cc79094bd62e45fd30eebd8fd07bcb6256f5f485d27e5b1dc7d313eeeee6649fbb1cbf6ddb50412823c0c28304ccbd65ba097c704770d734615a3a851c0ffa0b1350cc95467f1aab0f2a1df3c915b593939665a32c694dfa8af09bbe7298507fcd1b5f619f4631be31936ef15c2e5001faa5bf6a60dc4f00dbd771ca935c9cabfc5928c89bffbacd70bc28c14706e05ae30af40cf84e27f7d38410ab9ff0cb8b9f37f6ee20da77c53581a68c807741063463465c5caecd650e3a6f4637202cf139cfb4716374f96c2800bc832c4162924776da14831d27c1d4edc91282ae53753cad3703a302e921e57881ead075ddc3313119c65d255b85c69c911e34d11ee4ec288912692dd86ac4a812cd38bc8bb72555a1a1e781b0ca7208334e3c17cc23170f8da1f9217e17157040539358fcf3dc13fd85e166ebafcf7e92ece8453a5072b516e70f4680e4bb457436382a1c269cc300c5e923956e8219cd4ec0ce64118826d4667119aa7af2c5443a51928792ebba5824cc41ec192b9d76d124a9918e1eb32786913f0d4acf22d942c168301f4250d4acc6e01d4c7883a9673c2ef3c499ea00f771a8efb7c1fe0177506a2087aa885999fe9468ff3e94f9d31cdf586aba5aa201b0f955f61cb7a10fdf0649add46472a2d4a2ee572a0a458856c0d25bd86a50894dff533fdff5bcab826b41816e0491bc7198054fc6bf67d1129a354bf3128d2750a146e8287f6fe2bf0c3029a6e9c02dab0fecb8a1692a94f24219ad1822fe9cf2d707fcfef968ade2642cf63540d166119e35beff3697dae236ada17b15aa9cd2fde16d542a8e07bd9d30680591c2d2eb06821f0e0c130de590ebd89f961ee6e43f10d64d3f99adba9c30cb177cbcb6d4cc27725e16a42310c63232af9b1823751d6a1fe9ee108b9de20f5b979b336f0778637e9509b7e552bb7343701ee61b2be19b2c669677627cf1c2975aff8d2d50bfa37aa86dbc841fb0e9fda309e9e8e03052aa829d8646017cd1531069c502ddf00a31dd8e82446c7bb23606fd3d1e929f606f0342db8c9f372bb556dc6758c765e736c3e0914c9c4df6d0c954f2c296f95d4ad16d3bf85863a079bf397ee9c61e06551297c59702dc0d79e96b6b2392946c14c95dfc56e664d46123f24771aa1aa8dcdab81bfb5c35d959937c5484790ab02b2771217850b009dee284dc07b22e83a809e538b2e8cc721c909ea43c00b37156c710d94bca7158113e3147f668a4f982ee708dd5b586bf47ca952eb5d852d33ce29e6a477c0dba0e569d11099a60bd298e8ccb08c0d8427200be7232b5985d1eb4094fe01f6ed2101670d4df3ec1401d3623d54830e1134abe3f55fe370b3a963fec981e16a743c5a80b2eb63acc497e37f97ebaffa2fae00637f05641eb3ad964a6d143bc9c9af486dbaa03febfdbd8e2acaa07bb82fbb59f57c3e901a71db924c567f1b6bcd5a15922eef1670fe89bdfcb4058c7a0de5ad4513b2fe32c14230cc3a7a49d5c89d1de6c0e3fc670eb961f0ee64317b8b0bccb847b85710d4a78d287639e569dc7475e3528c62c7e5a86da9f523402960bfcf16fbc2ca90916bc2769d7f7bf28f6190650bc5f4bfd7c12cff1b5cb9de42e60442cde3add6091e88c472e6039d27cf488ac0b40441e01c2638a795c7e29af2523f139e4077bde01540c948895f1404813d3915d4937b76b2ad71725810b3771b62567c90e5f979d5cdfc19fd461ac2ac77ae63aba6e7d88ace41fa8d458e9f350c03ea3c394dc336c48851c9cfefe927b39a707deb569dfd31c9c23ff3fe00b037cf6c5e589dc327f6a1f27097e1a56b51c8514a8a521c616e14987b290aa88ab431bdf21b9aa6b39661151c59903eec49964192fed6de1b18f0804104f8280df1b7aa0cf26effed8ea9b758a337e179932dd42fb68441e6963c40fec5d7e909c5107bfbf89c92be41687aaa7a30fcb366049824aaf5e2943ed00ead3bc92df7461745ee3b8023570bc48ac30724542628b9e8845764d6ca0a8327aa6132c1060ed30745b0439394394f2ca1c880881b9fff8fc128b23d7f69ccf7d55081dd0e6c81fa210ba9e7e8bf412d1a6d91c65b2fe1bc06df7e2760ddaa5871693b976cff620ce8d9d9b6027172b9ba69e67309071c9c91470ce5ab0275145e4df710f50fd7c6c903bd42de9230cab92d14ff68be84c258735a7126654a240081cc8d8861b0acc2fd34b51a2aeff602f06565283c9f9469b7b27d264a81100f4c0890a26c4ffa6046ac6c29882d2b490ab44196c891f7960ab0fc2ab82f2470885f90d6f5d2beefa191178d3d1657abcb1fed7b38b426ecf981598f7347f5f5b760dd41c61803cae5ed26aecfb81ae376d9e714b82914adfdf4e2144670f6064e13f10d6ee111f959fff1ff4044699087d5a8a4599a35cf2a58b13c895c8f5602874f9f1662c91f529474b41de948e964b11143193175b9f9cdd5e7041cfb0b5c54960928128f9310fd06ebd3c4aef5993983212cb3674dc9f500eeaa073a9b555c38b31da65d144e282126744bfe747252794e2e25ac59447970ef4f0588db6da52f62be3a14a852ec2f3e237e486b1a44780536c55c52a9d6bf835c247d3b90909b712b27dbceb67ae842ae9b4be0ff3630443ddccce6b6e3a99ef24b6d1e470b65796535ef5033cdd7f2cbaba0bb522dcae29f471c4941bdf285a2d59281b673a9a1acf5a64186a034f0f088634f85f64d26d808ab01a0c4083e9f4ffa1fdc9fe7d8cc6336071bfce271bdfdc89a3d308c853b4211c77d9ae6883c80422e6870df6db4d5962e6bbc17f2a504070a86fe3ab5a4ae8674153529b3842b9683b392a9575b5e20b03a1c24e1ac8fdf0330b07abfc31196e6f7e7c8116ffa6e10275b3f91f433f817915c8a393dd7a8021bde77d7b3ac6886c68ba88bf36c204ef65060e5cf2846b8032c6230317d1ff56c34005e447a41f426794d0ce97bf0b2a6b1b0776842ad352c60d931f516dfe6210499a28ec8b822da9c26ebb7c3fa98d80f2b401c03a5cfa3f8c23ccebd059a33477323fd288e62aaa5f43d3df0ab2288e0b62c934b0a197df7d81d7499d882e61c9ce641415f5df403c77e720197b0581698b975d269f1ad0ded916bca9805d31e36af69c4f940b717269ba1e26e51f9ce068257f932b2599428239f942c0e4d55ec1822dac190afc54c8a399af9be6b633f01cea7796c613be4f86b9f0f0d5d9aa661816f0b1da51d316a51a2952e1622bde8a0d40af0e6e9e60955d88bf5e5d0ff992c2a02226f42991496cd2daa896b7d8e397dcbbb1a3b40c5743b5684ff08937a1745e23f85d813674c2c897b49033d2970d30e51f22d6520d097718aeb29d3dc2bcf90772b2d4f833830b235425ab8b649ebdc064bfcc39b36b5386deb515e5a65c85dea4913e712415698723f62a9325e12d0e04fdae318bb855bc66600e5ecf1ef9eb4f03d7a3541f2d46912828dc80d1c0f16d8dd45761abde197e6885ad69642b91fd557abe0dcd8e9df1039979be459142d0e8f0af246419ec17fc3b0a6c9734274704b19caf83115e382f7f6990dc81c4730e3b53d139dea7eb4b88a170a79a91a306979834766beebac447273c5b7762619878fee681a3cd25fa3a7f82bb29c878acc71228a9807f366c43eb46ec2586edf87353f189dd8b3a8c320213dc0f1e1f044eec4f00bbf0916a960efd937f61d5caab9c0f62c30ba2bc4c2003a07ba0538ba3fd41a3fa799e52bbbc81023e621d3b5668d5ae032ce13ba316b63b172a392f387b70757032ebd4b372e83ac806016ac43188f604c05a640c1eeada007f75a9ce6cc94ac37017817784e2f9e24ca14c96e704b21d8f66dac251b90c53fe9b3fec8fc391456b9a712c977d93b115c1897937a9ee2731c27835d95c472bbbfd202cc47e2f26426a135f043f1d38dc06b48698e63d0b3fcff1fde37da6d26104af862273eab4d42944d7200ea736b57281efae54de06b9209e2f3dc37bef72e3e402230d1d76b36a06625fef25e64f51bb2ef10b7b6a7554853dc608e2f5208332c116fd9125c4317e8c5efc8b72c531cd43c5a64ff181ca3bd0be15ee4559b3a8d150b638b5b46dce9ac63d544f7a1ee1fc394ada5348d69e5c4e8f2134656646ccafd5a878bbb3990496be82f6c8ddfd2b8fbf25ddb033651c64e7365ec06392a13904519db9608e46931c2bbf1f924bfbdb7640537232b4bf4a31dc01550f7634ca7a0fd561b5026626e076dcc8ae67699ffb27182410b056c2e3f37255b6fffaad4d13754b37ed1b6bba794530b99b61a88cc3db8ca278722e1338f877efee67daa803839c57e8de7eb54ea83feed906e7de5204234caef230842a39241afd3ffd7be37c07bcba07ed8354cec05bd493269726f98ebfa510cef7235d2d441357de842cc9a2a4c3fecea28ab7683ebe869240cc49111fca100cf6972d15dbd965883c022ebc5611630d098d50b6f23c97c7d25a05ebaea83e2d81571cb826d60424e2db4989b52a79932aa4b8125de9aabe39b333b337f5ab2862bda105dd1cd97a907b167f1ad96419f86698348b0f3ea09bc75d3075acbe5a3397dc02ab46394d7f60c9e1c4ee71405c704e1e9055ef0a687d2cb69d68291c61f7a115e7d6d2da156b5a0408d4233efdac0973c07b3183a351d3cfbf43fbf635bae8cada78082ae35043f31e29fd5517f575a9c476d56c9cc592fa771a4a978b194d336fcb68da8923bd9e9469466fd445300aad9434e9db93253e7ff2836424bf10bbf088a90155bd6963a20ea94fec200f63e1daac3e0b8f5c99a492b77c7584ebcc17b4e10a7cf5a06265f6fa2eb42d4c9f97bb87ba6642cb5f4a855f2678f90034aaf46fa4d5591d6fe200f82d5367a66e7355d71f904d509e1ee2f072862fd53b551ef0985f5f776521c44497b3d582d2c320d28fba920ce0baeb8789f84db05bdd6c5fe4d9518bcaff0072ebae8301eaf4978f8427d2b99070113cf07180d5b4656d05b4b2e138e05fa1fee7af58c07f030366920ff32b9d7925391a655c7c6d1661a435e5310b445df5d71821e4da8b16c6438e7b46c276a7dd643f31195a752ff9314f6c6227480cdd412b1e57e1fbaad96b53f1a147de5eeb2c2a6346aae70aa83181fd40ee6d2b8b5e4ddd79efca57523125d5314a1bdc142cbc78e4a7ef4249a554418f2bb48273016cbb1db4da952eacbf5c8128ed1158378e48fd41578cd7b8f3add24a78095272d27b37c95c193e2af6dbded7cd04f2dfef50a094ea71cb245b3c69fff5620db1a30d3d9813f9dba141549870973f41d13b2ed0fb5eac28a91e91e94e52f21df8911758f4a2987524324edf3d3a632d3e0442cb3b38c108cc626f616c7ecaf9b467a529a3239e002b3f67e69470e5faca61a5406e9d8bec8e070d26624666ed3f31710d80f76c4502400d327170f11c501abffdf775c15013c2ef35289765291db0af7f37fadb0f03a9cc9928c4b025f9b322bf7dc9d27db380cf5ba540a2721a29d67cca6b623c3bd4d3d1109da127818408c644ba426f7d247629245835d97934b1fe8e6c6627b64219d47992decd0a8c86085114a60df925e30a1fbd4657c81bc388f7fefbb1b18496d300ba7a9cb697918bf3b9e4b24f70b4453289cbbe42bc1f500476c52e092fea99039498197a2727f8f9bfc8eae62e47050ad69"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "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"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) 21:28:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'vlan0\x00', @local}) getpid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r2, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r3}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r2, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x0, '\x00', r6, r7, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r3, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r2, r4, r5], 0x0, 0x10, 0x5}, 0x90) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x100, '\x00', r6, r7, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=ANY=[@ANYBLOB="185800001000ea3c0000000018130000000000000000200000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000186200000e000000000000000600000018120000", @ANYRES32=r9, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r6, 0x27, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r10, r3, 0x6, &(0x7f000000bf80)=[r4, r5, r8], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c380)={&(0x7f000000c200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x1, [{0xa, 0x1, 0x80000001}]}, @struct={0x3, 0x4, 0x0, 0x4, 0x0, 0x80000000, [{0x6, 0x1, 0x8}, {0x6, 0x3, 0x3}, {0x3, 0x1, 0xd1c1}, {0xe, 0x2, 0x1}]}, @union={0xf, 0x1, 0x0, 0x5, 0x1, 0x6, [{0xb, 0x2, 0x5cb}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0x1, 0x3}, {0xd}, {0x1}, {0x4, 0x5}, {0x8, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x5f, 0x30, 0x30, 0x30, 0x3, 0x0, 0x71, 0x5f]}}, &(0x7f000000c300)=""/106, 0xe2, 0x6a, 0x0, 0x10001}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000c3c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r6, r11, 0x1, 0x5, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffff9}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x0, 0x3, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000340)='GPL\x00', 0xff, 0x0, 0x0, 0x40f00, 0x25, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x6, 0xffffffff, 0x7}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x1}, {0x0, 0x4, 0xd, 0x3}, {0x3, 0x4, 0x5, 0xa}, {0x1, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x1, 0x2}, {0x5, 0x2, 0xa, 0x1}, {0x5, 0x4, 0x1, 0x9}, {0x4, 0x3, 0xd, 0x2}, {0x4, 0x5, 0x0, 0x6}], 0x10, 0x401}, 0x90) syz_clone(0x6011000, &(0x7f0000000000)="d06f2c93071489fe", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="62cf1e746847f7f6e77ad1db06fc0ffb8665f83138b4e80b1bd1dc7b3d1871067013f9670300b086fe5d426ac35a19f69b314a52fed1816b19b2c937b695ed43f66b85f893c1e63cfe1db01093fec1e74a3fc5e4dde707ff27975a8cf3e9dfa2d7e31e72ae5f9228896ef007321745bd9ebe0cbf6a0903cf47be65d2a1776515fe82d9604dc3fb6e06d27dcfbf93e5bd6dd797936820ffaf2e6e62533546fa9fd3") 21:28:37 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "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"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "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"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) 21:28:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "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"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "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"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) (async) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) (async) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "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"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "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"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) (async) 21:28:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x10}, 0x884) 21:28:38 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:38 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:38 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83") 21:28:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "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"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "21c3ec5a7b972a9d2ed6ad32790d19bc541fb5b23bfa9437396ddc1fee5e8632954121b4aab3200d3ab79a2f354c6afb56189035e79781f9e6ee3f3dffd231f869b080665b14f3286df5a678cfe21e76d093b2a7f7e8073e3f1d387fe78cadec3709dbf684ab9d8faa9f4e9b343ad021790926cf9beb8f4b8c1ad73202bad1f666f732110a2d97a80ca5d6b401cd9e621500b951d0d9d074a4625df567f538740168ae392ffa1605912aba458dd2d83dff4f5435ab82996075ead693123cbdd05dcac69d31ad85231d679a19221467c7b8ae0b29c58a82ce9d22ed2f2078fe612d143c75ce35a562b98ba893a5e3de65696e8173d2cba1f23a57e86bc9c2"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) 21:28:38 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @alu={0x7, 0x1, 0x1, 0x2, 0x0, 0xfffffffffffffffc, 0xfffffffffffffff0}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r3}, 0x18) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r5, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r6}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x0, '\x00', r9, r10, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r6, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r5, r7, r8], 0x0, 0x10, 0x5}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x100, '\x00', r9, r10, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r9, 0x27, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r13, r6, 0x6, &(0x7f000000bf80)=[r7, r8, r11], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x5, 0x20, 0x5, 0x3, 0x202, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x50, 0xfffffff8, 0x10001, 0x38, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x13, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x8}, @map_fd={0x18, 0x2}, @map_fd, @ldst={0x2, 0x2, 0x4, 0x5, 0x5, 0xfffffffffffffff8, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ff}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x196}], &(0x7f0000000140)='GPL\x00', 0x9, 0xe1, &(0x7f0000000180)=""/225, 0x40f00, 0x40, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x10, 0x30, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000580)=[0xffffffffffffffff, r3, r4, r5, r14, r15], &(0x7f00000005c0)=[{0x1, 0x1, 0xe, 0x4}, {0x0, 0x3, 0x1, 0x3}, {0x2, 0x3, 0xd, 0x7}, {0x1, 0x3, 0x4, 0x6}, {0x1, 0x3, 0xe}], 0x10, 0x7}, 0x90) socket$kcm(0x29, 0x5, 0x0) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) r18 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r17}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000007c0)={0x0, r18}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', r18, 0x4000, r16}, 0x18) 21:28:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r2, r0}) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="76b0be68da069cdf020f20eba9fb8b787e06d2476df60b977e0362ac1d138c35aeb4c8bbd8271a338b8cfe8ec211f957d9264bcb9aa470a1569379ffd9d80ca823ed741c723ffdececdccad0672f30d006821bce8b52e0f131904b441fac739665d1093bb9f74f3ed394b7fd1c323222b2770290acdfc39672128fc9bda21b6eb63be40e2dcff1abd96b64fed94d234e2d612b8b77ca169817e6", 0x9a}, {&(0x7f00000001c0)="bf2bc0a226316e5b8277eb981a33e606b1c1a3d0b9ed39be5c1d78894d4558a8212815e8cf1441a0911606bfd17950a37295d993c3d3addcdb90067a15984d98c261586ccc8d3fb6b4b14b96ffdfbdf7388fd08791465e4fac1abc0000", 0x5d}, {&(0x7f0000000240)="6128224213bb21d3dd4a66f8eabb071508413f7dd1808c7a56df0d43f0ff4bf7b0d6dab7e296cb8750da202dc920cacb0a54b5cfbe31b68a8c8ae3a44f28a0fc2a853c", 0x43}, {&(0x7f00000002c0)='(', 0x1}, {&(0x7f0000000300)="bddc9ba852960c221c5411c195f2d5efeea9de7fd1dce8688dee665c3b4a2c65fbac0121212ae89784c8e2bd9f98fa3a5a3b04c778c1", 0x36}, {&(0x7f0000000340)="01a9ae6753d4aee6d188a1ff2847d8d2076a61bb49b47c17fbbca53809e8ae67", 0x20}], 0x6, &(0x7f0000000980)=[{0x90, 0x103, 0x40000005, "5a9a066405e7c3e1a2ef3364fde2630cafb1c56e19862e0cbe73abb96a226ac3665d949e960c1940531aba59d5f30787db3115aa32bf591e3e1cfa3198c0b341220ea64249eca112cbc03ecd2c8459de901678e075e6aeef22b0cb65221adfa2e8efe8b9d8c129ac11e5ba2fc0a0e063c6519d0233b01b28128194c7"}, {0xf0, 0x119, 0x1, "c9d63de7c29cab4f283cbe060c5692065eea9bf3d78fa557916fa21d6c25eb1a48b3233af4d177324d9d11a799cc137a9c9c8eb4f2fec9c928cd6760e794c1adca3256c3e3ff0ead3e35b61e4538919e96c6b22dc6e739928a89bbb927474c74480bc375057a4a887ad735effcc07b86d3fa46a168f4c68d0c6839b9b5e974ac21a55307d931cfb1d6a8eff000d76d41a0bb31e1c3c81bfbff953ed2643d70aa320dd054e6be4934df0cded413d083a539e931fff426bed3cd55ab295e76d5bd362335d733e1cb881d736de20fbce46f1d0f6d4d38296547b83fe542"}, {0x80, 0x101, 0x400, "60374b0a18fda2a7d66b4da3fcc1ee9119310638e77796f683c905ee129a4264ebb549cb738a7a9769088cf1980d33ab2ee533f695dcde244dbd39480e94612d9bf297c46080e10ced26fd8933df8d7f4756de50256a4d9ff4f27b9bf7e2fd14c1d9a44218ca2b8c351a0d76f1ac1f"}, {0x1010, 0x10c, 0x9, "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"}, {0x108, 0x84, 0x89, "15d3898e84134618a178dafa6f81a098b5c4f1f4b6b5a816be929be8e98286cbfcfff7b51bb7c3a877a6508429e988a9eef5bc6352a827e47282321be6e6c38990a071d31ee67277f31696e63cc29eb91890d60816407fe9db1d8fc1d40e43ba5a8d598b892198f418523ad57e0b3b68af5897866af0d990be33e70dd391fb373eae92e65eb8c8f8642d9e0dd06621115df157e93884fa378d3415b8095ede86b489fdc35aa08aa5e1c73ae65976722a4412c76702fe828e467f3fbfe0161eac72ad86e9872723b627e7ff2a72d33bed575302c35c8ea941171565b0c15d814b1fe511eadf86acb90b74f56c07a724abf065d86179"}, {0x110, 0x0, 0xfdd, "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"}, {0xb0, 0x118, 0x101, "cc79b8d4ccf2d2863f6d17b326aa8ceaf2c67ce63d2564feeb1f2b53b9cfd58491d42a32b2aecf50254c75a0b368798d982d2edfdda444d7af32a767261cf5749ca2227022de614b4788bce3cafd5a1033d66de4b5a80455a6f8c09960e138af9fd9189c509fe0edbe840d433e39779321d466303ac8d794c0ea771392dfcfb5045fdbf1af8e5ab99f5af57db0c9c4f28b993d926e103634e6"}, {0x20, 0x0, 0x8, "7d17a82e230b17a5c76538fd00e85f"}, {0x48, 0x0, 0x80, "f3f611fcc2945457c8bb9f2ef0e06d31f1f8955161c3f9ad1667d4212ab820db6e890e417d6a564a659837ac5c6abb1bc2ea8719596d"}, {0xe8, 0x103, 0x5, "94cd5a960dd5bbf195c3b4b1a744181ef7afeb252a8253db5aae63233f9a26d4ffbd2db3d33940e9c08c946042681f8097e213204a18c398aed7d1058114a8d48134bdd81e45b505be6f1386f533600adcce40cd196e43a14da6c220e781f9d30742ace387a10ac7ba07e2f355d09a4e15ce8e379ecfe5e001a169372d5079f011c35720d02c90e068caa881f90c78cd0ff304310dea183eda1ffb6ee9a61dbe6a6a5b7c5c093ea3e8dcdd14cf02308593600c885c6cbd18590e2ddac19ac24415006d37d00ad83bef580dd9b80e61ee0d25f9cbceb8fa4b"}], 0x1628}, 0x20000040) 21:28:38 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @alu={0x7, 0x1, 0x1, 0x2, 0x0, 0xfffffffffffffffc, 0xfffffffffffffff0}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r3}, 0x18) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r5, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r6}, 0x20) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x0, '\x00', r9, r10, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r6, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r5, r7, r8], 0x0, 0x10, 0x5}, 0x90) (async) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x100, '\x00', r9, r10, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r9, 0x27, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r13, r6, 0x6, &(0x7f000000bf80)=[r7, r8, r11], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x5, 0x20, 0x5, 0x3, 0x202, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) (async) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x50, 0xfffffff8, 0x10001, 0x38, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x13, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x8}, @map_fd={0x18, 0x2}, @map_fd, @ldst={0x2, 0x2, 0x4, 0x5, 0x5, 0xfffffffffffffff8, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ff}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x196}], &(0x7f0000000140)='GPL\x00', 0x9, 0xe1, &(0x7f0000000180)=""/225, 0x40f00, 0x40, '\x00', r0, 0x25, r1, 0x8, &(0x7f0000000340)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x10, 0x30, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000580)=[0xffffffffffffffff, r3, r4, r5, r14, r15], &(0x7f00000005c0)=[{0x1, 0x1, 0xe, 0x4}, {0x0, 0x3, 0x1, 0x3}, {0x2, 0x3, 0xd, 0x7}, {0x1, 0x3, 0x4, 0x6}, {0x1, 0x3, 0xe}], 0x10, 0x7}, 0x90) (async) socket$kcm(0x29, 0x5, 0x0) (async) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={0x0}, 0x18) r18 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r17}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000007c0)={0x0, r18}, 0x10) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', r18, 0x4000, r16}, 0x18) 21:28:38 executing program 4: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83") 21:28:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x24a616252d863bc9) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) 21:28:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:39 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a") 21:28:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) 21:28:39 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:39 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x10) 21:28:39 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) 21:28:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:39 executing program 0: getpid() getpid() gettid() r0 = getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r1, 0x2) 21:28:39 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:40 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a") 21:28:40 executing program 1: getpid() getpid() gettid() r0 = getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r1, 0x2) 21:28:40 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:40 executing program 3: getpid() getpid() gettid() r0 = getpid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1000000}, 0x48) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) 21:28:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x30}, 0x0) sendmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:40 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae") 21:28:41 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:41 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83") 21:28:41 executing program 2: getpid() getpid() gettid() r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:41 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) 21:28:41 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:41 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c") 21:28:41 executing program 2: socketpair(0x25, 0x6, 0x2, &(0x7f0000000040)) 21:28:42 executing program 0: getpid() getpid() gettid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:28:42 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x10) 21:28:42 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x10}, 0x884) 21:28:42 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa018795964") 21:28:42 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:42 executing program 0: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:42 executing program 4: getpid() getpid() gettid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:28:42 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:42 executing program 1: socketpair(0x0, 0x6, 0x2, &(0x7f0000000040)) 21:28:43 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:43 executing program 0: getpid() getpid() gettid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:28:43 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) 21:28:43 executing program 4: socketpair(0x0, 0x6, 0x2, &(0x7f0000000040)) 21:28:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:43 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959") [ 1054.283254][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.289600][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 21:28:44 executing program 4: getpid() getpid() r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:44 executing program 1: socketpair(0x0, 0x6, 0x2, &(0x7f0000000040)) 21:28:44 executing program 0: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) 21:28:44 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa01879") 21:28:44 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:44 executing program 3: getpid() r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:44 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:45 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:45 executing program 0: socketpair(0x25, 0x0, 0x2, &(0x7f0000000040)) 21:28:45 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) 21:28:45 executing program 0: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:45 executing program 1: socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)) 21:28:46 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:46 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa01879") 21:28:46 executing program 1: r0 = getpid() perf_event_open(0x0, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:46 executing program 3: socketpair(0x25, 0x0, 0x0, 0x0) 21:28:46 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) 21:28:46 executing program 0: r0 = getpid() perf_event_open(0x0, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:47 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa01879") 21:28:47 executing program 0: socketpair(0x25, 0x0, 0x0, 0x0) 21:28:47 executing program 2: r0 = getpid() perf_event_open(0x0, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:47 executing program 1: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:47 executing program 0: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:47 executing program 1: socketpair(0x25, 0x0, 0x0, 0x0) 21:28:47 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:47 executing program 3: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:47 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa018") 21:28:48 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:48 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa01879") 21:28:48 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0") 21:28:48 executing program 1: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:48 executing program 2: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:48 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x10}, 0x884) 21:28:49 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x11, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000f10f0000000000000200000018110000bb545908b84389e6ad0d8fa4", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x15, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000540)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x10, 0x7, 0x80000000}, 0x10, 0x1e49a, r1, 0x4, &(0x7f00000005c0)=[r1, r1, r1, r1, 0x1, r1], &(0x7f0000000600)=[{0x3, 0x2, 0x3, 0x1}, {0x5, 0x3, 0xa, 0x2}, {0x4, 0x3, 0x9, 0xc}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x549}, 0x90) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x40, 0xfc, 0x3, 0x0, 0x100000000, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xce7, 0x4, @perf_bp, 0x208, 0x6, 0x1e, 0x6, 0x8, 0x200, 0x2, 0x0, 0xcb4, 0x0, 0xad1}, r0, 0x9, r1, 0x1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xf, 0x0, 0x1, 0x1010, r1, 0xff, '\x00', r2, r1, 0x0, 0x4, 0x1}, 0x48) (async) 21:28:49 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:49 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:49 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0") 21:28:49 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x10}, 0x884) 21:28:50 executing program 1: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:50 executing program 0: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x100000042) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x6, '\x00', 0x0, r0, 0x4, 0x2, 0x5}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0xfffffff8, 0x2, 0x81, 0x429, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, r0, 0x2, 0x3, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x0, 0x7, 0x401, 0x2000, r1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x12, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x1, 0x1, 0x1, 0x8, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0xd2, &(0x7f0000000580)=""/210, 0x40f00, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000700)=[{0x0, 0x4, 0x3, 0x5}], 0x10, 0x8}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000d80)={0x4}, 0x8) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x7, 0x8}, 0xc) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0x2, 0x18}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)='%+9llu \x00'}, 0x20) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x58, &(0x7f0000000d00)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{0x1, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000dc0)}, 0x20) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x5, 0x0, 0x4, 0x6, 0x1040, 0xffffffffffffffff, 0x81, '\x00', 0x0, r0, 0x0, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x15, 0x27, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x0, 0xaa, &(0x7f0000000280)=""/170, 0x40f00, 0x40, '\x00', r5, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, r6, r7, 0x2, &(0x7f0000000b00)=[r8, r9, r10, r11, 0x1, r12, r13], &(0x7f0000000b40)=[{0x3, 0x3, 0x3}, {0x3, 0x1, 0xa, 0x9}], 0x10, 0x6}, 0x90) 21:28:50 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249f") 21:28:50 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:50 executing program 4: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x10}, 0x884) 21:28:50 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x100000042) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x6, '\x00', 0x0, r0, 0x4, 0x2, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0xfffffff8, 0x2, 0x81, 0x429, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, r0, 0x2, 0x3, 0x1}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x0, 0x7, 0x401, 0x2000, r1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) (async, rerun: 32) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x12, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x1, 0x1, 0x1, 0x8, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0xd2, &(0x7f0000000580)=""/210, 0x40f00, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000700)=[{0x0, 0x4, 0x3, 0x5}], 0x10, 0x8}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000d80)={0x4}, 0x8) (async, rerun: 32) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x7, 0x8}, 0xc) (async, rerun: 32) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0x2, 0x18}, 0xc) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)='%+9llu \x00'}, 0x20) (async) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', 0x0, r0, 0x4, 0x1, 0x1}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x58, &(0x7f0000000d00)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{0x1, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000dc0)}, 0x20) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x5, 0x0, 0x4, 0x6, 0x1040, 0xffffffffffffffff, 0x81, '\x00', 0x0, r0, 0x0, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x15, 0x27, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x0, 0xaa, &(0x7f0000000280)=""/170, 0x40f00, 0x40, '\x00', r5, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, r6, r7, 0x2, &(0x7f0000000b00)=[r8, r9, r10, r11, 0x1, r12, r13], &(0x7f0000000b40)=[{0x3, 0x3, 0x3}, {0x3, 0x1, 0xa, 0x9}], 0x10, 0x6}, 0x90) 21:28:50 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:51 executing program 0: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18, 0x10}, 0x884) 21:28:51 executing program 1: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:51 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[0xffffffffffffffff, r2, r3], 0x0, 0x10, 0x5}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x1, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r11, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0], 0x0, 0x99, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x17, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x13, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, r3], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r13, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r14}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r13, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r16, 0x0, '\x00', r17, r18, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r14, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r19, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r13, r15, r16], 0x0, 0x10, 0x5}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r15, 0x100, '\x00', r17, r18, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r13}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r20}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r17, 0x27, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r21, r14, 0x6, &(0x7f000000bf80)=[r15, r16, r19], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x29, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x8, 0x3, 0x40, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0x7, 0x30, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x3}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r12, 0x1e, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x4, 0x5, 0x5, 0x2}, 0x10, r21, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x4, 0x3, 0xe, 0x2}, {0x2, 0x5, 0x7, 0x8}, {0x0, 0x3, 0x7, 0x5}, {0x4, 0x1, 0x3}], 0x10, 0x81}, 0x90) 21:28:51 executing program 2: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249f") 21:28:51 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:51 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:51 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:52 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:52 executing program 0: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') 21:28:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:52 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 21:28:52 executing program 4: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249f") 21:28:52 executing program 0: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:52 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[0xffffffffffffffff, r2, r3], 0x0, 0x10, 0x5}, 0x90) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x1, 0x3, 0x5}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r11, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0], 0x0, 0x99, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x17, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x13, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, r3], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r13, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r14}, 0x20) (async) r16 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r13, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r16, 0x0, '\x00', r17, r18, 0x1, 0x3, 0x5}, 0x48) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r14, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r19, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r13, r15, r16], 0x0, 0x10, 0x5}, 0x90) (async) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r15, 0x100, '\x00', r17, r18, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r13}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r20}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r17, 0x27, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r21, r14, 0x6, &(0x7f000000bf80)=[r15, r16, r19], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x29, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x8, 0x3, 0x40, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0x7, 0x30, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x3}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r12, 0x1e, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x4, 0x5, 0x5, 0x2}, 0x10, r21, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x4, 0x3, 0xe, 0x2}, {0x2, 0x5, 0x7, 0x8}, {0x0, 0x3, 0x7, 0x5}, {0x4, 0x1, 0x3}], 0x10, 0x81}, 0x90) 21:28:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:52 executing program 3: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:52 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:53 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee0424") 21:28:53 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x9}, 0x8) 21:28:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:53 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:53 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:53 executing program 1: syz_open_procfs$namespace(0x0, 0x0) 21:28:53 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee0424") 21:28:53 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:54 executing program 0: syz_open_procfs$namespace(0x0, 0x0) 21:28:54 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04") 21:28:54 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:54 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x9}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x9}, 0x8) (async) [ 1064.888837][ T1151] device hsr_slave_0 left promiscuous mode 21:28:54 executing program 0: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) [ 1064.940432][ T1151] device hsr_slave_1 left promiscuous mode [ 1064.972461][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1064.979943][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 21:28:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'vlan0\x00', @local}) getpid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000005bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, [@generic={0x28, 0x2, 0x9, 0x9f2}, @jmp={0x5, 0x1, 0x7, 0x6, 0x5, 0xffffffffffffffff, 0xffffffffffffffed}, @alu={0x4, 0x1, 0x8, 0xa, 0x3, 0x30, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5e}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xed91}}]}, &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r2, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r3}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r2, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x0, '\x00', r6, r7, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r3, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r2, r4, r5], 0x0, 0x10, 0x5}, 0x90) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x100, '\x00', r6, r7, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=ANY=[@ANYBLOB="185800001000ea3c0000000018130000000000000000200000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000186200000e000000000000000600000018120000", @ANYRES32=r9, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r6, 0x27, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r10, r3, 0x6, &(0x7f000000bf80)=[r4, r5, r8], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c380)={&(0x7f000000c200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x1, [{0xa, 0x1, 0x80000001}]}, @struct={0x3, 0x4, 0x0, 0x4, 0x0, 0x80000000, [{0x6, 0x1, 0x8}, {0x6, 0x3, 0x3}, {0x3, 0x1, 0xd1c1}, {0xe, 0x2, 0x1}]}, @union={0xf, 0x1, 0x0, 0x5, 0x1, 0x6, [{0xb, 0x2, 0x5cb}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0x1, 0x3}, {0xd}, {0x1}, {0x4, 0x5}, {0x8, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x5f, 0x30, 0x30, 0x30, 0x3, 0x0, 0x71, 0x5f]}}, &(0x7f000000c300)=""/106, 0xe2, 0x6a, 0x0, 0x10001}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000c3c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r6, r11, 0x1, 0x5, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffff9}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x0, 0x3, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000340)='GPL\x00', 0xff, 0x0, 0x0, 0x40f00, 0x25, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x6, 0xffffffff, 0x7}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x1}, {0x0, 0x4, 0xd, 0x3}, {0x3, 0x4, 0x5, 0xa}, {0x1, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x1, 0x2}, {0x5, 0x2, 0xa, 0x1}, {0x5, 0x4, 0x1, 0x9}, {0x4, 0x3, 0xd, 0x2}, {0x4, 0x5, 0x0, 0x6}], 0x10, 0x401}, 0x90) syz_clone(0x6011000, &(0x7f0000000000)="d06f2c93071489fe", 0x8, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="62cf1e746847f7f6e77ad1db06fc0ffb8665f83138b4e80b1bd1dc7b3d1871067013f9670300b086fe5d426ac35a19f69b314a52fed1816b19b2c937b695ed43f66b85f893c1e63cfe1db01093fec1e74a3fc5e4dde707ff27975a8cf3e9dfa2d7e31e72ae5f9228896ef007321745bd9ebe0cbf6a0903cf47be65d2a1776515fe82d9604dc3fb6e06d27dcfbf93e5bd6dd797936820ffaf2e6e62533546fa9fd3") 21:28:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x10}, 0x884) 21:28:55 executing program 0: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:28:55 executing program 3: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1065.772393][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1065.779870][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 21:28:55 executing program 0: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee") 21:28:55 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:55 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffe95) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000ff0300002892f209000000007d56ffffedffffff8c3a3000f0ffffff850000005e00000018190000441f8379f07974e02298529ee163639f7520b40b284cc4b4", @ANYRES32=0x1, @ANYBLOB="000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000091ed00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x15, 0xfff, 0x9, 0x3, 0x4, r3, 0xe6, '\x00', r9, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x3ff, '\x00', r4, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x48) [ 1066.262419][ T1151] device bridge_slave_1 left promiscuous mode [ 1066.268667][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state 21:28:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) [ 1066.419836][ T1151] device bridge_slave_0 left promiscuous mode [ 1066.427974][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.445137][ T1151] device hsr_slave_0 left promiscuous mode [ 1066.454871][ T1151] device hsr_slave_1 left promiscuous mode 21:28:56 executing program 3: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aa") 21:28:56 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1066.539414][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1066.550305][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1066.572473][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1066.579941][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 21:28:56 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffe95) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffe95) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000005b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000006e00)={0x6, 0x12, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000ff0300002892f209000000007d56ffffedffffff8c3a3000f0ffffff850000005e00000018190000441f8379f07974e02298529ee163639f7520b40b284cc4b4", @ANYRES32=0x1, @ANYBLOB="000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000091ed00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000005c80)='GPL\x00', 0x7, 0x1000, &(0x7f0000005cc0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000006cc0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000006d00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000006d40)=[{0x2, 0x4, 0xf, 0x4}, {0x2, 0x4, 0x9, 0x8}, {0x1, 0x2, 0xd, 0x5}, {0x2, 0x4, 0xd, 0x7}, {0x1, 0x2, 0xf, 0x9}, {0x5, 0x2, 0x1, 0x3fa5a89bcfd23218}, {0x0, 0x1, 0xf, 0x5}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x3, 0x6, 0xf}], 0x10, 0x1000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000006f00)={{r0, 0xffffffffffffffff}, &(0x7f0000005b80), &(0x7f0000006ec0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f000000a540)=@base={0xf, 0xc50, 0x1f, 0x4, 0x20, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000a640)={0x1, 0x58, &(0x7f000000a5c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000a680), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000a6c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={r1, 0x0, 0x89, 0x0, &(0x7f000000a840)="2ea4f3428b964c6dbd69bf1d629437d5cdea5aab5e5e291ca6d8139bc99cf97c4c8f2976c7bd04ed1f692e82d80b22d50f4123abe2808034936e8aaced5183dbed078a1660f13496e954b400e19219e562ab8fa099924c54679e8c8ab72903e7941af5d5ede442677993e0d20b5f3143d3e9abaeef4394112b7b47881ce7818f952d374ad0585776cf", 0x0, 0x0, 0x0, 0xe5, 0x0, &(0x7f000000a900)="890e286157c6932f8108708c2113d6b94b6ad1122310e75456a4aa00e750c65cb5be7a5625b8b333f90cab6667e053e6531c22641adf8e8790eb4692c9ffad7999baeda36060a933b6ce5fce4b1d14e22a37b2e01b44ec1e96c5bcaf420528ce924dccca00e756bf9a6c5fc3e43ecd2ba02a7fe93560699beb0e92276b5b73cdd6776961c740bfe96fa5d4b931b299274b1a1e74f3d846a227c4938b3d70a72c003c20e4d05c6d0b27cef93a6bdf083d036c4475b8a1828ca0b8508f252479dc1fdd5e0db60fb99f180849e0d5ba8d7f5e8c227ca40b5810db79304ca7e180df0b639e6e78", 0x0, 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f000000ad00)={0x6, 0x27, &(0x7f000000aa80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0x0, 0xb, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x2, 0x1, 0x4, 0x3, 0x0, 0xfffffffffffffffc, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f000000abc0)='syzkaller\x00', 0x7c9, 0x4b, &(0x7f000000ac00)=""/75, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000acc0)=[r0, r2, r3], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f000000adc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x100, '\x00', r4, r5, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000bf40)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f000000c040)={0x1, 0xd, &(0x7f000000ae40)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @generic={0x80, 0x3, 0x4, 0x7, 0x40}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f000000aec0)='syzkaller\x00', 0x9, 0x1000, &(0x7f000000af00)=""/4096, 0x40f00, 0x40, '\x00', r4, 0x27, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f000000bf00)={0x4, 0x2, 0x3e4, 0x40}, 0x10, r8, r1, 0x6, &(0x7f000000bf80)=[r2, r3, r6], &(0x7f000000bfc0)=[{0x5, 0x5, 0x3, 0xa}, {0x3, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x5, 0xc}, {0x3, 0x5, 0xc, 0xc}, {0x5, 0x1, 0xf, 0x1}, {0x3, 0x2, 0x7, 0x8}], 0x10, 0x401}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x15, 0xfff, 0x9, 0x3, 0x4, r3, 0xe6, '\x00', r9, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x3ff, '\x00', r4, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x48) [ 1066.622413][ T1151] device bridge_slave_1 left promiscuous mode [ 1066.658947][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.724240][ T1151] device bridge_slave_0 left promiscuous mode [ 1066.740515][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1067.172724][ T1151] device hsr_slave_0 left promiscuous mode [ 1067.186196][ T1151] device hsr_slave_1 left promiscuous mode [ 1067.193468][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1067.207678][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1067.226213][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1067.243106][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1067.301285][ T1151] device bridge_slave_1 left promiscuous mode [ 1067.307592][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state 21:28:57 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:57 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1068.112160][ T1151] device bridge_slave_0 left promiscuous mode [ 1068.118596][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state 21:28:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000240)={r0, 0x0, 0x3a, 0x0, &(0x7f0000000040)="18d576fae9eb2f473ed1e878f253ff19c7523d6b8f3adc350f76ff59cace5b00764fa56a52bb33255b7df68149c41716e0c30acd0ce746650983", 0x0, 0x1, 0x0, 0xe6, 0x0, &(0x7f0000000140)="2d365259e10c2ff913b4b0ab12a6f937f7a7dbcfc289a96de664c913af763f44f4fc7a45085df1488b7171cb0fb0f68e5d8d9ba7d5e9970f0797cd70c7c40fdef539580b2c07291ee0e51fe6fd90a37e93bf9f1ca492df15c15f1e5d89c48f65a6f9e76929a51e2ab11f3b2ff37780cced28381e6f7afbe50bdbd291a46a34886bcfc842683ba3206c41b778f68774b6c492b11f48276de6b17d777e896668cb2d8ad25333d04c7ece7be8219bdf6a087e7b66a06ddfe91ecea1d5c9e99b86c0fa1486fc7887d9b1032aec5c9b225e92bdeca7d6c3560d46d4d964b86f5fb2a33e5c71ebb750", 0x0, 0x2, 0x0, 0x7f}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x7ff, 0x6, 0xe2, 0x802, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x4, 0x4, 0x6}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 21:28:58 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000240)={r0, 0x0, 0x3a, 0x0, &(0x7f0000000040)="18d576fae9eb2f473ed1e878f253ff19c7523d6b8f3adc350f76ff59cace5b00764fa56a52bb33255b7df68149c41716e0c30acd0ce746650983", 0x0, 0x1, 0x0, 0xe6, 0x0, &(0x7f0000000140)="2d365259e10c2ff913b4b0ab12a6f937f7a7dbcfc289a96de664c913af763f44f4fc7a45085df1488b7171cb0fb0f68e5d8d9ba7d5e9970f0797cd70c7c40fdef539580b2c07291ee0e51fe6fd90a37e93bf9f1ca492df15c15f1e5d89c48f65a6f9e76929a51e2ab11f3b2ff37780cced28381e6f7afbe50bdbd291a46a34886bcfc842683ba3206c41b778f68774b6c492b11f48276de6b17d777e896668cb2d8ad25333d04c7ece7be8219bdf6a087e7b66a06ddfe91ecea1d5c9e99b86c0fa1486fc7887d9b1032aec5c9b225e92bdeca7d6c3560d46d4d964b86f5fb2a33e5c71ebb750", 0x0, 0x2, 0x0, 0x7f}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x7ff, 0x6, 0xe2, 0x802, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x4, 0x4, 0x6}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 21:28:58 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:28:59 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:28:59 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1070.149691][ T1151] device hsr_slave_0 left promiscuous mode 21:28:59 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:00 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:00 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r1}, 0x8) [ 1071.251414][ T1151] device hsr_slave_1 left promiscuous mode 21:29:01 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:01 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:01 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1072.295156][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1072.305051][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1072.338018][ T1151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1072.348468][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1072.379033][ T1151] device bridge_slave_1 left promiscuous mode [ 1072.393651][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state 21:29:02 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1072.780694][ T1151] device bridge_slave_0 left promiscuous mode [ 1072.786942][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state 21:29:02 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:03 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x4, 0x12) (async) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r1}, 0x8) 21:29:03 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:04 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1074.999550][ T1151] device hsr_slave_0 left promiscuous mode 21:29:04 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 1075.133276][ T1151] device hsr_slave_1 left promiscuous mode [ 1075.141520][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1075.190248][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1075.696415][ T1151] device bridge_slave_1 left promiscuous mode [ 1075.702769][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.302569][ T1151] device bridge_slave_0 left promiscuous mode [ 1076.308802][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.332829][ T1151] device hsr_slave_0 left promiscuous mode [ 1077.358285][ T1151] device hsr_slave_1 left promiscuous mode [ 1077.399836][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1077.679287][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1078.176178][ T1151] device bridge_slave_1 left promiscuous mode [ 1078.199746][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.733752][ T1151] device bridge_slave_0 left promiscuous mode [ 1078.739986][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1080.208244][ T1151] device hsr_slave_0 left promiscuous mode [ 1080.350704][ T1151] device hsr_slave_1 left promiscuous mode [ 1080.361802][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1080.402214][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1080.458621][ T1151] device bridge_slave_1 left promiscuous mode [ 1080.490740][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1080.867026][ T1151] device bridge_slave_0 left promiscuous mode [ 1080.879958][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1081.996696][ T1151] device hsr_slave_0 left promiscuous mode [ 1082.007674][ T1151] device hsr_slave_1 left promiscuous mode [ 1082.162785][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1082.202359][ T1151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1082.295517][ T1151] device bridge_slave_1 left promiscuous mode [ 1082.333075][ T1151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.354871][ T1151] device bridge_slave_0 left promiscuous mode [ 1082.361464][ T1151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.711024][ T1151] device veth1_macvtap left promiscuous mode [ 1082.717081][ T1151] device veth0_macvtap left promiscuous mode [ 1082.764984][ T1151] device veth1_vlan left promiscuous mode [ 1082.780767][ T1151] device veth0_vlan left promiscuous mode [ 1084.315813][ T1151] device veth1_macvtap left promiscuous mode [ 1084.331203][ T1151] device veth0_macvtap left promiscuous mode [ 1084.337290][ T1151] device veth1_vlan left promiscuous mode [ 1084.377170][ T1151] device veth0_vlan left promiscuous mode [ 1087.008043][ T1151] device veth1_macvtap left promiscuous mode [ 1087.024423][ T1151] device veth0_macvtap left promiscuous mode [ 1087.044771][ T1151] device veth1_vlan left promiscuous mode [ 1087.081377][ T1151] device veth0_vlan left promiscuous mode [ 1087.414891][ T1151] device veth1_macvtap left promiscuous mode [ 1087.452432][ T1151] device veth0_macvtap left promiscuous mode [ 1087.463065][ T1151] device veth1_vlan left promiscuous mode [ 1087.489007][ T1151] device veth0_vlan left promiscuous mode 21:29:24 executing program 1: getpid() syz_clone(0x10020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aa") 21:29:24 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:24 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:24 executing program 0: bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f000000aa00)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x50) 21:29:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x10}, 0x884) 21:29:25 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:29:25 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:25 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:29:25 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:26 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:27 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:27 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:29:28 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:28 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:29:28 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1099.160402][T10353] Bluetooth: hci2: command 0x0409 tx timeout [ 1099.240326][T10353] Bluetooth: hci4: command 0x0409 tx timeout [ 1099.240407][ T3561] Bluetooth: hci5: command 0x0409 tx timeout 21:29:29 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:29 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:29 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:30 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:30 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:30 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) [ 1101.250383][T15723] Bluetooth: hci2: command 0x041b tx timeout [ 1101.320364][T10353] Bluetooth: hci4: command 0x041b tx timeout [ 1101.331250][T15723] Bluetooth: hci5: command 0x041b tx timeout 21:29:31 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:31 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:31 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:32 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f00000003c0)}, 0x10) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:32 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) [ 1103.330467][ T3561] Bluetooth: hci2: command 0x040f tx timeout [ 1103.400373][T10353] Bluetooth: hci5: command 0x040f tx timeout [ 1103.406492][T10353] Bluetooth: hci4: command 0x040f tx timeout 21:29:33 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:33 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:34 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:34 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:34 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1105.400348][T10353] Bluetooth: hci2: command 0x0419 tx timeout [ 1105.481438][T10353] Bluetooth: hci4: command 0x0419 tx timeout [ 1105.488315][T10353] Bluetooth: hci5: command 0x0419 tx timeout 21:29:35 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:35 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:36 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:36 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:36 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:36 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:37 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:37 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:38 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:38 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:39 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:39 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:40 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:40 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:41 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:41 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:42 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) 21:29:42 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:42 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:43 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, 0xffffffffffffffff, 0x8) 21:29:43 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:43 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:44 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080)}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:44 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:45 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:45 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1115.723268][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.729574][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 21:29:45 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080)}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:46 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:46 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:47 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:47 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080)}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:47 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:48 executing program 2: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:48 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:49 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:49 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:50 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:50 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:51 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:51 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:52 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0x0, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:52 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:52 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:53 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0x0, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:53 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:54 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0x0, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:54 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x3, 0xffffffffffffffff, 0x2) 21:29:55 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:55 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x0, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:55 executing program 2: getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:29:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:56 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x0, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:56 executing program 2: getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:29:57 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x0, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:57 executing program 4: getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x2) 21:29:58 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:58 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:58 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x2) 21:29:59 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:29:59 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 21:29:59 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:29:59 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:00 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:00 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:00 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:00 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:00 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:01 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:01 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:01 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) 21:30:01 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:02 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:02 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:03 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:03 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:04 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:04 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:04 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f00000003c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r3, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:04 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:05 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:05 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:06 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r3, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:06 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:06 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:07 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r3, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:07 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:07 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:08 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:08 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:09 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) [ 1139.472366][ T1151] team0 (unregistering): Port device team_slave_1 removed 21:30:09 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:09 executing program 4: getpid() getpid() gettid() getpid() r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r1]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, r1, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:09 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) [ 1140.373479][ T1151] team0 (unregistering): Port device team_slave_0 removed 21:30:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:10 executing program 4: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) [ 1141.124552][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:30:10 executing program 2: getpid() getpid() gettid() getpid() r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r1]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, r1, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:11 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:11 executing program 4: getpid() getpid() gettid() getpid() r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r1]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, r1, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:11 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) [ 1142.413958][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:30:12 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:12 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:13 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) [ 1143.400384][ T3561] Bluetooth: hci1: command 0x0406 tx timeout [ 1143.400496][T10353] Bluetooth: hci0: command 0x0406 tx timeout [ 1143.407158][ T3561] Bluetooth: hci3: command 0x0406 tx timeout 21:30:13 executing program 4: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:13 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:14 executing program 2: getpid() perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:14 executing program 4: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:14 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1145.594590][ T1151] bond0 (unregistering): Released all slaves 21:30:15 executing program 2: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:16 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1147.202466][T18893] syz-executor.4 (18893) used greatest stack depth: 16504 bytes left 21:30:17 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:18 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:18 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd8ae54395625a55) 21:30:19 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, 0xffffffffffffffff, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:19 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:30:20 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1151.115941][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1151.449072][ T1151] team0 (unregistering): Port device team_slave_0 removed 21:30:21 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1151.835623][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:30:21 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1152.091278][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:30:22 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:30:23 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x0) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:24 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) [ 1155.073068][ T1151] bond0 (unregistering): Released all slaves 21:30:24 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:25 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:26 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:27 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) r6 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x81, 0x26, 0x9, 0x0, 0x81, 0x0, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x8040, 0x7, 0x5, 0x2, 0xfffffffffffeffff, 0x9, 0x8, 0x0, 0x9}, r4, 0x6, r6, 0xd8ae54395625a55) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:28 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x0, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000000000000000", 0x18, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:29 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x40, 0x3, 0x0, 0x5, 0x0, 0x4, 0x24100, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, r0, 0x1, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) 21:30:29 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1160.348111][ T1151] team0 (unregistering): Port device team_slave_1 removed 21:30:30 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="2b08e4c61f9d147b8500000000000000"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r4]}, 0x90) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) [ 1161.316141][ T1151] team0 (unregistering): Port device team_slave_0 removed 21:30:31 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:31 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r4, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x5, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x7, 0x0, 0x7abe659958fb34ca, 0x6, 0x7, 0x1}], &(0x7f0000000300)='GPL\x00', 0x3, 0x48, &(0x7f0000000340)=""/72, 0x41100, 0x11, '\x00', r5, 0x25, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x3, 0x8ab, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000500)=[r4, 0x1, r4, r4, r4, r4], &(0x7f0000000540)=[{0x5, 0x2}, {0x2, 0x2, 0xb, 0x5}, {0x3, 0x4, 0xa, 0x9}, {0x0, 0x3, 0x2, 0xb}, {0x1, 0x2, 0xe, 0xb}], 0x10, 0x3}, 0x90) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x5) [ 1162.526066][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:30:32 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:33 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f00000003c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r3, 0x10, 0xffffffffffffffff, 0x5) [ 1164.340882][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:30:34 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1165.250311][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 1165.257052][ T7] Bluetooth: hci6: command 0x0409 tx timeout [ 1165.320403][T32104] Bluetooth: hci7: command 0x0409 tx timeout 21:30:35 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000002340)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r3, 0x10, 0xffffffffffffffff, 0x5) 21:30:36 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1167.330315][T15720] Bluetooth: hci6: command 0x041b tx timeout [ 1167.340797][T15720] Bluetooth: hci1: command 0x041b tx timeout [ 1167.410407][T15720] Bluetooth: hci7: command 0x041b tx timeout [ 1167.981013][ T1151] bond0 (unregistering): Released all slaves 21:30:37 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, r3, 0x10, 0xffffffffffffffff, 0x5) 21:30:38 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1169.400383][T15720] Bluetooth: hci1: command 0x040f tx timeout [ 1169.407875][T15720] Bluetooth: hci6: command 0x040f tx timeout [ 1169.480409][T15720] Bluetooth: hci7: command 0x040f tx timeout 21:30:39 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0x5, 0x1, 0x7b, 0x0, 0x4, 0x200, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2208, 0x6, 0xb, 0x6, 0xffffffffffffff80, 0x0, 0x400, 0x0, 0xdd33, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x0, 0x6, 0x8, 0x4, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) perf_event_open(&(0x7f0000000000)={0xc36cfda8b2a1efc0, 0x80, 0x1, 0x51, 0x7, 0x7, 0x0, 0x7, 0x5000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x8, 0x3ff}, 0xa000, 0x374, 0x9, 0x6, 0x4, 0xd, 0x1, 0x0, 0x3f, 0x0, 0x7fffffffffffffff}, r0, 0xe, r1, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) perf_event_open$cgroup(&(0x7f0000000740)={0x4, 0x80, 0xb4, 0xfb, 0xda, 0x4, 0x0, 0x100, 0x4c51, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000700), 0x7}, 0x404, 0x12000000000000, 0x6, 0x0, 0x8001, 0x7fffffff, 0x7fff, 0x0, 0x5, 0x0, 0x3}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x5) 21:30:40 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1171.490299][ T3535] Bluetooth: hci6: command 0x0419 tx timeout [ 1171.496351][ T3535] Bluetooth: hci1: command 0x0419 tx timeout [ 1171.570283][ T3535] Bluetooth: hci7: command 0x0419 tx timeout 21:30:41 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be6", 0xc, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1173.320420][T15271] Bluetooth: hci8: command 0x0409 tx timeout 21:30:43 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be6", 0xc, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") 21:30:44 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1175.400295][T10353] Bluetooth: hci8: command 0x041b tx timeout 21:30:45 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be6", 0xc, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1177.162356][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.168663][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 [ 1177.480418][T10353] Bluetooth: hci8: command 0x040f tx timeout 21:30:47 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfaeb, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 21:30:48 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000", 0x12, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1178.805190][ T1151] team0 (unregistering): Port device team_slave_1 removed 21:30:49 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1179.494425][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1179.576779][T15271] Bluetooth: hci8: command 0x0419 tx timeout 21:30:49 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000", 0x12, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1180.379327][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1181.298321][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:30:51 executing program 2: perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8000000000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x8) [ 1185.480913][ T1151] bond0 (unregistering): Released all slaves [ 1190.841849][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1191.504909][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1192.371943][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1193.500757][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1197.668816][ T1151] bond0 (unregistering): Released all slaves [ 1203.251275][ T1151] team0 (unregistering): Port device team_slave_1 removed [ 1204.244577][ T1151] team0 (unregistering): Port device team_slave_0 removed [ 1204.905468][ T1151] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1205.558635][ T1151] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:31:16 executing program 2: getpid() getpid() gettid() r0 = getpid() r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x9, &(0x7f0000002180)=@raw=[@ldst={0x0, 0x3, 0x2, 0x0, 0x0, 0x20}, @printk={@d}], &(0x7f0000002200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002d00)=@bpf_lsm={0x1d, 0x2, &(0x7f00000024c0)=@raw=[@call, @jmp={0x5, 0x0, 0x8}], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[0xffffffffffffffff, r2]}, 0x90) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0x1000, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0xee10, 0x9, 0x0, 0x2, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8}, r0, 0x3, r2, 0x2) syz_clone(0x10020000, &(0x7f0000000000)="ebfc101d4611bca8c4333be60fa1ed610000", 0x12, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="1f44be7ee76890d2912ac6d8826a874658e252814d7a72acafe58dde37221fc0e79e740eeab14c326f59c5aa5094f410422ee5e8de4cf3fdc6b808e9b76a24f24952fba92857bf889e3289ab6dd492877133aee8aaee04249fa0187959649c83ae6a55f9b6dc2e070000000000000000e103bc516d0b748d192e7b8ffe081a6c2d31b4c608c5a8ba13f1c0c494c97761577fec8b14291838d0007a545b2047a4da279a5842ac6d5d195ed8f95d62b336be2938d761e236e3f94b2ccc9aa81fd26cd3bb4062673a19482e78d7f11473d29a166a52d8f45c6da5357af1cef9") [ 1209.525363][ T1151] bond0 (unregistering): Released all slaves [ 1210.040406][T15271] Bluetooth: hci0: command 0x0409 tx timeout [ 1210.450461][ T27] INFO: task kworker/0:2:15703 blocked for more than 143 seconds. [ 1210.458483][ T27] Not tainted 5.15.152-syzkaller #0 [ 1210.490291][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1210.498990][ T27] task:kworker/0:2 state:D stack:24376 pid:15703 ppid: 2 flags:0x00004000 [ 1210.540233][ T27] Workqueue: events linkwatch_event [ 1210.545633][ T27] Call Trace: [ 1210.548915][ T27] [ 1210.571399][ T27] __schedule+0x12c4/0x45b0 [ 1210.576053][ T27] ? mark_lock+0x98/0x340 [ 1210.590736][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1210.596751][ T27] ? __sched_text_start+0x8/0x8 [ 1210.630237][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1210.635823][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1210.653440][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1210.658742][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1210.681192][ T27] schedule+0x11b/0x1f0 [ 1210.690487][ T27] schedule_preempt_disabled+0xf/0x20 [ 1210.695893][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1210.720262][ T27] ? linkwatch_event+0xa/0x50 [ 1210.724990][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1210.752441][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1210.758481][ T27] ? print_irqtrace_events+0x210/0x210 [ 1210.777160][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1210.790240][ T27] mutex_lock_nested+0x17/0x20 [ 1210.795046][ T27] linkwatch_event+0xa/0x50 [ 1210.799557][ T27] process_one_work+0x8a1/0x10c0 [ 1210.830363][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1210.836059][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1210.862465][ T27] ? kthread_data+0x4e/0xc0 [ 1210.867013][ T27] ? wq_worker_running+0x97/0x170 [ 1210.880231][ T27] worker_thread+0xaca/0x1280 [ 1210.884966][ T27] kthread+0x3f6/0x4f0 [ 1210.889031][ T27] ? rcu_lock_release+0x20/0x20 [ 1210.910262][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1210.915119][ T27] ret_from_fork+0x1f/0x30 [ 1210.919646][ T27] [ 1210.946221][ T27] INFO: task kworker/0:21:17522 blocked for more than 143 seconds. [ 1210.972417][ T27] Not tainted 5.15.152-syzkaller #0 [ 1210.978160][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1210.997864][ T27] task:kworker/0:21 state:D stack:24632 pid:17522 ppid: 2 flags:0x00004000 [ 1211.030327][ T27] Workqueue: events switchdev_deferred_process_work [ 1211.037025][ T27] Call Trace: [ 1211.060265][ T27] [ 1211.063335][ T27] __schedule+0x12c4/0x45b0 [ 1211.067865][ T27] ? mark_lock+0x98/0x340 [ 1211.086429][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1211.107760][ T27] ? __sched_text_start+0x8/0x8 [ 1211.120228][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1211.125739][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1211.150231][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1211.155482][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1211.176635][ T27] schedule+0x11b/0x1f0 [ 1211.188263][ T27] schedule_preempt_disabled+0xf/0x20 [ 1211.200230][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1211.205471][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1211.240276][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1211.245520][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1211.270301][ T27] ? print_irqtrace_events+0x210/0x210 [ 1211.275805][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1211.291955][ T27] mutex_lock_nested+0x17/0x20 [ 1211.296753][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1211.332550][ T27] process_one_work+0x8a1/0x10c0 [ 1211.337552][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1211.357915][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1211.363841][ T27] ? kthread_data+0x4e/0xc0 [ 1211.368372][ T27] ? wq_worker_running+0x97/0x170 [ 1211.396414][ T27] worker_thread+0xaca/0x1280 [ 1211.401587][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1211.407521][ T27] kthread+0x3f6/0x4f0 [ 1211.440228][ T27] ? rcu_lock_release+0x20/0x20 [ 1211.445121][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1211.449720][ T27] ret_from_fork+0x1f/0x30 [ 1211.470996][ T27] [ 1211.474053][ T27] INFO: task syz-executor.1:18469 blocked for more than 144 seconds. [ 1211.500313][ T27] Not tainted 5.15.152-syzkaller #0 [ 1211.506058][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1211.539460][ T27] task:syz-executor.1 state:D stack:27520 pid:18469 ppid: 17354 flags:0x00004006 [ 1211.559807][ T27] Call Trace: [ 1211.565767][ T27] [ 1211.568717][ T27] __schedule+0x12c4/0x45b0 [ 1211.576386][ T27] ? __sched_text_start+0x8/0x8 [ 1211.587857][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1211.595065][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1211.620233][ T27] schedule+0x11b/0x1f0 [ 1211.624429][ T27] schedule_preempt_disabled+0xf/0x20 [ 1211.630032][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1211.644985][ T27] ? __tun_chr_ioctl+0x460/0x2270 [ 1211.650125][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1211.659299][ T27] mutex_lock_nested+0x17/0x20 [ 1211.682486][ T27] __tun_chr_ioctl+0x460/0x2270 [ 1211.687518][ T27] ? tun_flow_create+0x310/0x310 [ 1211.702864][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1211.707913][ T27] ? security_file_ioctl+0x7d/0xa0 [ 1211.727330][ T27] ? tun_chr_poll+0x620/0x620 [ 1211.740229][ T27] __se_sys_ioctl+0xf1/0x160 [ 1211.744917][ T27] do_syscall_64+0x3d/0xb0 [ 1211.749374][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1211.779035][ T27] RIP: 0033:0x7ff5ebcf2da9 [ 1211.790229][ T27] RSP: 002b:00007ff5ea2730c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1211.798724][ T27] RAX: ffffffffffffffda RBX: 00007ff5ebe20f80 RCX: 00007ff5ebcf2da9 [ 1211.830281][ T27] RDX: 0000000000000000 RSI: 00000000400454da RDI: 0000000000000003 [ 1211.847280][ T27] RBP: 00007ff5ebd3f47a R08: 0000000000000000 R09: 0000000000000000 [ 1211.870229][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1211.878227][ T27] R13: 000000000000000b R14: 00007ff5ebe20f80 R15: 00007ffec2733438 [ 1211.908522][ T27] [ 1211.918236][ T27] INFO: task syz-executor.1:18471 blocked for more than 144 seconds. [ 1211.935135][ T27] Not tainted 5.15.152-syzkaller #0 [ 1211.950225][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1211.958901][ T27] task:syz-executor.1 state:D stack:29056 pid:18471 ppid: 17354 flags:0x00004006 [ 1212.007486][ T27] Call Trace: [ 1212.011873][ T27] [ 1212.014824][ T27] __schedule+0x12c4/0x45b0 [ 1212.019366][ T27] ? __sched_text_start+0x8/0x8 [ 1212.043199][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1212.048709][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1212.072756][ T27] schedule+0x11b/0x1f0 [ 1212.077046][ T27] schedule_preempt_disabled+0xf/0x20 [ 1212.100315][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1212.105564][ T27] ? __tun_chr_ioctl+0x460/0x2270 [ 1212.120032][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1212.125518][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 1212.150258][ T27] mutex_lock_nested+0x17/0x20 [ 1212.155050][ T27] __tun_chr_ioctl+0x460/0x2270 [ 1212.159914][ T27] ? tun_flow_create+0x310/0x310 [ 1212.190241][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1212.201739][ T27] ? security_file_ioctl+0x7d/0xa0 [ 1212.206878][ T27] ? tun_chr_poll+0x620/0x620 [ 1212.222119][ T27] __se_sys_ioctl+0xf1/0x160 [ 1212.226736][ T27] do_syscall_64+0x3d/0xb0 [ 1212.239974][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1212.270244][ T27] RIP: 0033:0x7ff5ebcf2da9 [ 1212.274688][ T27] RSP: 002b:00007ff5ea2520c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1212.300268][ T27] RAX: ffffffffffffffda RBX: 00007ff5ebe21050 RCX: 00007ff5ebcf2da9 [ 1212.308267][ T27] RDX: 0000000020000180 RSI: 00000000400454da RDI: 0000000000000003 [ 1212.329183][ T27] RBP: 00007ff5ebd3f47a R08: 0000000000000000 R09: 0000000000000000 [ 1212.360249][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1212.368386][ T27] R13: 000000000000000b R14: 00007ff5ebe21050 R15: 00007ffec2733438 [ 1212.388763][ T27] [ 1212.400237][ T27] INFO: task syz-executor.1:18473 blocked for more than 145 seconds. [ 1212.408321][ T27] Not tainted 5.15.152-syzkaller #0 [ 1212.430277][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1212.438969][ T27] task:syz-executor.1 state:D stack:29056 pid:18473 ppid: 17354 flags:0x00004006 [ 1212.480263][ T27] Call Trace: [ 1212.483573][ T27] [ 1212.486509][ T27] __schedule+0x12c4/0x45b0 [ 1212.500424][ T27] ? __sched_text_start+0x8/0x8 [ 1212.505323][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1212.522584][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1212.527821][ T27] schedule+0x11b/0x1f0 [ 1212.550225][ T27] schedule_preempt_disabled+0xf/0x20 [ 1212.555629][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1212.590237][ T27] ? __tun_chr_ioctl+0x460/0x2270 [ 1212.595299][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1212.602650][ T27] ? __might_fault+0xb4/0x110 [ 1212.607431][ T27] mutex_lock_nested+0x17/0x20 [ 1212.640240][ T27] __tun_chr_ioctl+0x460/0x2270 [ 1212.645155][ T27] ? tun_flow_create+0x310/0x310 [ 1212.650109][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1212.662596][ T27] ? security_file_ioctl+0x7d/0xa0 [ 1212.667748][ T27] ? tun_chr_poll+0x620/0x620 [ 1212.700234][ T27] __se_sys_ioctl+0xf1/0x160 [ 1212.704873][ T27] do_syscall_64+0x3d/0xb0 [ 1212.730235][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1212.736172][ T27] RIP: 0033:0x7ff5ebcf2da9 [ 1212.750244][ T27] RSP: 002b:00007ff5ea2310c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1212.758927][ T27] RAX: ffffffffffffffda RBX: 00007ff5ebe21120 RCX: 00007ff5ebcf2da9 [ 1212.786442][ T27] RDX: 00000000200001c0 RSI: 0000000000008924 RDI: 0000000000000003 [ 1212.820233][ T27] RBP: 00007ff5ebd3f47a R08: 0000000000000000 R09: 0000000000000000 [ 1212.828245][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1212.840221][ T27] R13: 000000000000006e R14: 00007ff5ebe21120 R15: 00007ffec2733438 [ 1212.850584][ T27] [ 1212.853637][ T27] [ 1212.853637][ T27] Showing all locks held in the system: [ 1212.880280][ T27] 1 lock held by khungtaskd/27: [ 1212.885165][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1212.897358][ T27] 4 locks held by kworker/u4:2/154: [ 1212.909268][ T27] #0: ffff888014fe4938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1212.924526][ T27] #1: ffffc900010cfd20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1212.962871][ T27] #2: ffff88814bd12bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1212.993228][ T27] #3: ffff88814bd14990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 1213.011793][ T27] 5 locks held by kworker/u4:3/1151: [ 1213.017098][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.034037][ T27] #1: ffffc9000524fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.046565][ T27] #2: ffffffff8d9cfe50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1213.057514][ T27] #3: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1213.090235][ T27] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 1213.107638][ T27] 2 locks held by getty/3259: [ 1213.120227][ T27] #0: ffff88802482d098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1213.130114][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1213.149536][ T27] 2 locks held by kworker/0:5/3560: [ 1213.157126][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.190227][ T27] #1: ffffc90004007d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.205023][ T27] 3 locks held by kworker/0:6/3561: [ 1213.220470][ T27] #0: ffff88814b463938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.243704][ T27] #1: ffffc90004017d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.260213][ T27] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1213.276403][ T27] 3 locks held by kworker/0:2/15703: [ 1213.282600][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.312795][ T27] #1: ffffc900030e7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.324449][ T27] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1213.337723][ T27] 3 locks held by kworker/0:20/15723: [ 1213.347453][ T27] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.363420][ T27] #1: ffffc90002ff7d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.374665][ T27] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1213.386778][ T27] 3 locks held by kworker/0:21/17522: [ 1213.405910][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1213.421129][ T27] #1: ffffc90003907d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1213.437475][ T27] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1213.470228][ T27] 3 locks held by syz-executor.1/18007: [ 1213.476233][ T27] #0: ffff88814bd10460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1213.500318][ T27] #1: ffff8880397553b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1213.518242][ T27] #2: ffff88814bd100e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1213.541194][ T27] 1 lock held by syz-executor.0/18208: [ 1213.550464][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1213.559462][ T27] 1 lock held by syz-executor.3/18410: [ 1213.575129][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1213.591899][ T27] 1 lock held by syz-executor.1/18469: [ 1213.600512][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x460/0x2270 [ 1213.609856][ T27] 1 lock held by syz-executor.1/18471: [ 1213.624255][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x460/0x2270 [ 1213.640351][ T27] 1 lock held by syz-executor.1/18473: [ 1213.652546][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x460/0x2270 [ 1213.663338][ T27] 1 lock held by syz-executor.1/18585: [ 1213.677470][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1213.694453][ T27] 1 lock held by syz-executor.3/18588: [ 1213.700132][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1213.709812][ T27] 1 lock held by syz-executor.0/18589: [ 1213.715811][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1213.741945][ T27] 3 locks held by syz-executor.2/18669: [ 1213.749505][ T27] 2 locks held by syz-executor.2/18686: [ 1213.755536][ T27] 1 lock held by syz-executor.4/18706: [ 1213.762936][ T27] #0: ffff88814bd12bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1213.778567][ T27] 2 locks held by syz-executor.2/18725: [ 1213.790120][ T27] 1 lock held by syz-executor.4/18731: [ 1213.820247][ T27] 2 locks held by syz-executor.2/18738: [ 1213.825833][ T27] 1 lock held by syz-executor.2/18755: [ 1213.840236][ T27] 3 locks held by syz-executor.2/18770: [ 1213.848273][ T27] 1 lock held by syz-executor.2/18782: [ 1213.854799][ T27] 1 lock held by syz-executor.2/18789: [ 1213.860617][ T27] 1 lock held by syz-executor.2/18813: [ 1213.866077][ T27] #0: ffff88814bd12bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1213.904079][ T27] 1 lock held by syz-executor.2/18831: [ 1213.909572][ T27] 1 lock held by syz-executor.2/18840: [ 1213.927707][ T27] 1 lock held by syz-executor.4/18877: [ 1213.950289][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1213.959308][ T27] 1 lock held by syz-executor.2/18927: [ 1213.990259][ T27] 1 lock held by syz-executor.2/18934: [ 1213.995755][ T27] 1 lock held by syz-executor.2/18941: [ 1214.020240][ T27] 1 lock held by syz-executor.2/18948: [ 1214.025728][ T27] 1 lock held by syz-executor.2/18953: [ 1214.038937][ T27] 1 lock held by syz-executor.2/18958: [ 1214.070241][ T27] 3 locks held by syz-executor.2/18963: [ 1214.075820][ T27] 2 locks held by syz-executor.2/18968: [ 1214.094576][ T27] 1 lock held by syz-executor.2/18980: [ 1214.100066][ T27] 1 lock held by syz-executor.3/18996: [ 1214.129074][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1214.150278][ T27] 1 lock held by syz-executor.1/18997: [ 1214.155759][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1214.190229][ T27] 1 lock held by syz-executor.0/18999: [ 1214.195715][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1214.206044][T15720] Bluetooth: hci0: command 0x040f tx timeout [ 1214.232907][ T27] 1 lock held by syz-executor.2/19014: [ 1214.238415][ T27] 2 locks held by syz-executor.2/19023: [ 1214.261423][ T27] 1 lock held by syz-executor.4/19032: [ 1214.266908][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1214.297262][ T27] 1 lock held by syz-executor.2/19058: [ 1214.330225][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1214.339241][ T27] 1 lock held by syz-executor.2/19061: [ 1214.360228][ T27] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1214.389111][ T27] [ 1214.391550][ T27] ============================================= [ 1214.391550][ T27] [ 1214.410322][ T27] NMI backtrace for cpu 0 [ 1214.414673][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1214.422652][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1214.432711][ T27] Call Trace: [ 1214.435998][ T27] [ 1214.438929][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1214.443623][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1214.449263][ T27] ? panic+0x84d/0x84d [ 1214.453343][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1214.458507][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1214.463448][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1214.468322][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1214.474477][ T27] ? _printk+0xd1/0x111 [ 1214.478634][ T27] ? panic+0x84d/0x84d [ 1214.482700][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1214.487550][ T27] ? panic+0x84d/0x84d [ 1214.491622][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1214.496648][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1214.502796][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1214.508784][ T27] watchdog+0xe72/0xeb0 [ 1214.512993][ T27] kthread+0x3f6/0x4f0 [ 1214.517060][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1214.522088][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1214.526683][ T27] ret_from_fork+0x1f/0x30 [ 1214.531117][ T27] [ 1214.534508][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1214.539718][ C1] NMI backtrace for cpu 1 [ 1214.539728][ C1] CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 5.15.152-syzkaller #0 [ 1214.539743][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1214.539751][ C1] Workqueue: bat_events batadv_nc_worker [ 1214.539842][ C1] RIP: 0010:match_held_lock+0x2/0xb0 [ 1214.539858][ C1] Code: 00 75 cf 48 c7 c7 a0 13 8b 8a 48 c7 c6 e0 13 8b 8a e8 32 17 30 f7 0f 0b eb b6 e8 09 fb ff ff 66 0f 1f 84 00 00 00 00 00 55 53 01 00 00 00 48 39 77 10 74 67 48 89 fb 81 7f 20 00 00 10 00 72 [ 1214.539870][ C1] RSP: 0018:ffffc90000ce7aa8 EFLAGS: 00000087 [ 1214.539881][ C1] RAX: 0000000000000003 RBX: 0000000000000002 RCX: ffffc90000ce7b03 [ 1214.539891][ C1] RDX: 1ffff9200019cf68 RSI: ffffffff8c91f720 RDI: ffff88813fe90b40 [ 1214.539901][ C1] RBP: ffffc90000ce7be8 R08: dffffc0000000000 R09: fffffbfff1bc71b6 [ 1214.539912][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000002 [ 1214.539921][ C1] R13: 000000000000000a R14: ffff88813fe90af0 R15: ffff88813fe90b40 [ 1214.539931][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1214.539942][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1214.539952][ C1] CR2: 000055770e4d0030 CR3: 000000001f856000 CR4: 00000000003506e0 [ 1214.539965][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1214.539973][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1214.539981][ C1] Call Trace: [ 1214.539986][ C1] [ 1214.539991][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1214.540008][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1214.540022][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1214.540043][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1214.540057][ C1] ? nmi_handle+0xf7/0x370 [ 1214.540093][ C1] ? match_held_lock+0x2/0xb0 [ 1214.540105][ C1] ? default_do_nmi+0x62/0x150 [ 1214.540117][ C1] ? exc_nmi+0xab/0x120 [ 1214.540128][ C1] ? end_repeat_nmi+0x16/0x31 [ 1214.540147][ C1] ? match_held_lock+0x2/0xb0 [ 1214.540159][ C1] ? match_held_lock+0x2/0xb0 [ 1214.540172][ C1] ? match_held_lock+0x2/0xb0 [ 1214.540187][ C1] [ 1214.540191][ C1] [ 1214.540195][ C1] lock_release+0x245/0x9a0 [ 1214.540208][ C1] ? rcu_lock_release+0x5/0x20 [ 1214.540219][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 1214.540231][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1214.540245][ C1] batadv_nc_worker+0x239/0x5b0 [ 1214.540261][ C1] process_one_work+0x8a1/0x10c0 [ 1214.540280][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1214.540296][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1214.540310][ C1] ? kthread_data+0x4e/0xc0 [ 1214.540322][ C1] ? wq_worker_running+0x97/0x170 [ 1214.540335][ C1] worker_thread+0xaca/0x1280 [ 1214.540356][ C1] kthread+0x3f6/0x4f0 [ 1214.540368][ C1] ? rcu_lock_release+0x20/0x20 [ 1214.540380][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1214.540393][ C1] ret_from_fork+0x1f/0x30 [ 1214.540412][ C1] [ 1214.555009][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1214.832034][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1214.840018][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1214.850073][ T27] Call Trace: [ 1214.853354][ T27] [ 1214.856286][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1214.860973][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1214.866617][ T27] ? panic+0x84d/0x84d [ 1214.870700][ T27] panic+0x318/0x84d [ 1214.874596][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1214.880241][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1214.886405][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1214.891615][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1214.897686][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1214.903839][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1214.910004][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1214.916167][ T27] watchdog+0xeb0/0xeb0 [ 1214.920337][ T27] kthread+0x3f6/0x4f0 [ 1214.924408][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1214.929432][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1214.934023][ T27] ret_from_fork+0x1f/0x30 [ 1214.938459][ T27] [ 1214.941711][ T27] Kernel Offset: disabled [ 1214.946025][ T27] Rebooting in 86400 seconds..